Encryption key News
Proposed security rules from China would demand US tech companies hand over sensitive technology to the government read more »
Compliance with FINRA regulatory standards is on the way read more »
ICO report uncovered chaotic security read more »
Attackers can easily crack cryptographic keys used by the WP-Slimstat plug-in and use them to read information from a site's database read more »
The company confirmed that a software program preloaded on some of its laptops exposes users to potential attacks read more »
The group's attack on hard-drive firmware is one of the most advanced ever discovered, Kaspersky Lab said read more »more news ..
Encryption key Blogs
Another revelation about GCHQ's massive spying activities, plus two (small) victories read more »
Support these projects - or lose key freedoms read more »
Here's what we need to do read more »
How to destroy liberty, online safety, commercial confidentiality and the UK tech startup scene with one sentence read more »more blogs ..
Watch this on demand webinar which explores IT innovation, managed print services and business agility.
Check out our latest articles on Microsoft's next-generation operating system.
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.
Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.
Encryption key In Depth
Experts agree firmware attacks are possible. But until the Equation group report nobody was worried read more »
Even though the term "phablet" draws a lot of snarky comments, GE Capital CTO Eric Reed thinks they'll overtake PCs in a few years. read more »
Big data technologies and practices are moving quickly. Here's what you need to know to stay ahead of the game. read more »
How an SME is working to gain IL3 certification to enable it to make its mark in the government supplier pool read more »
The risks are no greater than transactions involving payment cards read more »
Fitness trackers and other wearables are all the rage, but privacy advocates warn that they come with the risk of a "privacy nightmare" read more »more in depth ..
Encryption key Slideshows
Click through all the products being released at VMworld last week read more »
Whatever your poison -- Windows 7 or 8, updated or not -- there's a desktop tool just begging to become part of your repertoire read more »
The year's only halfway done, but hackers have already filled enough headlines to last a decade. read more »
One year ago, on June 5, 2013, The Washington Post published the first of Edward Snowden's leaks. Since then, many more revelations have come to light. Here are a look at 10 of the biggest. read more »more slideshows ..