We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Encryption key

Encryption key News

Two US supermarket chains report major computer break-ins

Up to 1,000 stores may be affected read more »

Heartbleed exposes weaknesses in hardware design

Heartbleed highlights memory and cache architecture weaknesses, but a DHS-funded project proposes changes read more »

BlackBerry patches vulnerabilities in BlackBerry OS, enterprise server software

The flaws could allow attackers to access data stored on BlackBerry phones or sensitive credentials logged on servers read more »

Home Office awards £3.8 million PSN contract to Thales

Two-year contract to support production of Biometric Residency Permits for non-EU foreign nationals read more »

Study finds firmware plagued by poor encryption and backdoors

Firmware within the 'Internet of Things' could pose opportunities for hackers, researchers find read more »

Mobile chips face lockdown to prevent hacks

Chip makers are adding more security layers to protect mobile device users from malicious attacks and code injection read more »

more news ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Encryption key In Depth

Wearables: Are we handing more tools to Big Brother?

Fitness trackers and other wearables are all the rage, but privacy advocates warn that they come with the risk of a "privacy nightmare" read more »

Pirates, cheats and IT certs

Cheating is on the rise, but IT certification programs are fighting back read more »

Google targets business users with cloud, Docs advances

At Google I/O, the company makes it clear the enterprise is key read more »

CISOs taking a leap of faith

Changing career focus can surprise you read more »

Why IT needs to drive the risk conversation

Go beyond just saying no read more »

How to defend against the OpenSSL Heartbleed flaw

Basic steps for IT CIOs, CISOs and IT Directors to take now read more »

more in depth ..
Encryption key Slideshows

Top 25 free tools for every Windows desktop

Whatever your poison -- Windows 7 or 8, updated or not -- there's a desktop tool just begging to become part of your repertoire read more »

The 8 scariest digital security stories of 2014 (so far)

The year's only halfway done, but hackers have already filled enough headlines to last a decade. read more »

The 10 biggest Edward Snowden leaks

One year ago, on June 5, 2013, The Washington Post published the first of Edward Snowden's leaks. Since then, many more revelations have come to light. Here are a look at 10 of the biggest. read more »

Microsoft's SME offerings

Microsoft takes us around a Kelly Hoppen designed apartment to show us its collaborative business products read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open