We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Encryption key

Encryption key News

File-encrypting Android ransomware 'Simplocker' targets English-speaking users

The malware was updated to use FBI-themed alerts and encrypt backup files, researchers from ESET said read more »

Virtru launches business email encryption service for Google Apps

The service, which allows for fine administrator control of messaging, is free to try through later this year read more »

Stealthy ransomware 'Critroni' uses Tor, could replace Cryptolocker

The Cryptolocker takedown led to a better designed, more resilient ransomware threat read more »

Net neutrality a key battleground in growing fight over encryption, activists say

Both carriers and government now have an interest in how users keep their online lives private read more »

Digital certificate breach at Indian authority also targeted Yahoo domains, possibly others

The full scope of the security breach is currently unknown, a Google security engineer said read more »

Google blocks bogus digital certificates issued in India

It's unclear how the certificates were issued by the country's National Informatics Centre read more »

more news ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Encryption key In Depth

Wearables: Are we handing more tools to Big Brother?

Fitness trackers and other wearables are all the rage, but privacy advocates warn that they come with the risk of a "privacy nightmare" read more »

Pirates, cheats and IT certs

Cheating is on the rise, but IT certification programs are fighting back read more »

Google targets business users with cloud, Docs advances

At Google I/O, the company makes it clear the enterprise is key read more »

CISOs taking a leap of faith

Changing career focus can surprise you read more »

Why IT needs to drive the risk conversation

Go beyond just saying no read more »

How to defend against the OpenSSL Heartbleed flaw

Basic steps for IT CIOs, CISOs and IT Directors to take now read more »

more in depth ..
Encryption key Slideshows

The 8 scariest digital security stories of 2014 (so far)

The year's only halfway done, but hackers have already filled enough headlines to last a decade. read more »

The 10 biggest Edward Snowden leaks

One year ago, on June 5, 2013, The Washington Post published the first of Edward Snowden's leaks. Since then, many more revelations have come to light. Here are a look at 10 of the biggest. read more »

Microsoft's SME offerings

Microsoft takes us around a Kelly Hoppen designed apartment to show us its collaborative business products read more »

Microsoft Exchange tools every IT admin will love

Easing your test, deployment and management headaches read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open