Encryption key

Encryption key News

The end for 1024-bit SSL certificates is near, Mozilla kills a few more

Website owners still using 1024-bit SSL certificates should replace them with 2048-bit ones read more »

Prosecution: Silk Road founder nabbed In flagrante delicto

However, Ross Ulbritch's defense attorneys cast doubt on the prosecution's allegations read more »

U.S. government lurked on Silk Road for over a year

In a New York federal court, the prosecution begins its case against the alledged mastermind of the Silk Road underground marketplace read more »

CryptoWall ransomware is back with new version after two months of silence

CryptoWall 3.0 uses both the Tor and I2P anonymity networks for increased stealthiness read more »

OpenSSL patches eight new vulnerabilities

The flaws are of moderate and low severity, but server admins should still update read more »

Using spellcheck? Electromagnetic fields could reveal your writing

Georgia Tech is studying better software and hardware designs to prevent electronic snooping read more »

more news ..
Encryption key Blogs

Could Cameron Be So Stupid as to Undermine Encryption?

How to destroy liberty, online safety, commercial confidentiality and the UK tech startup scene with one sentence read more »

Let's Encrypt - and Fix HTTPS While We're At It

Web encryption is a good idea, but it's currently broken read more »

Firefox Leans Towards the Vertical

Mozilla's next 10 years read more »

You Can't Trust Closed-Source Code - Germany Agrees

Plus yet more security issues with cloud computing read more »

more blogs ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Encryption key In Depth

GE Capital's CTO sees the death of PCs, the rise of phablets

Even though the term "phablet" draws a lot of snarky comments, GE Capital CTO Eric Reed thinks they'll overtake PCs in a few years. read more »

Big trends in big data analytics

Big data technologies and practices are moving quickly. Here's what you need to know to stay ahead of the game. read more »

How an SME overcame technical hurdles to work with government

How an SME is working to gain IL3 certification to enable it to make its mark in the government supplier pool read more »

Why giving mobile apps banking info isn't as risky as it seems

The risks are no greater than transactions involving payment cards read more »

Wearables: Are we handing more tools to Big Brother?

Fitness trackers and other wearables are all the rage, but privacy advocates warn that they come with the risk of a "privacy nightmare" read more »

Pirates, cheats and IT certs

Cheating is on the rise, but IT certification programs are fighting back read more »

more in depth ..
Encryption key Slideshows

Hot products at VMworld 2014

Click through all the products being released at VMworld last week read more »

Top 25 free tools for every Windows desktop

Whatever your poison -- Windows 7 or 8, updated or not -- there's a desktop tool just begging to become part of your repertoire read more »

The 8 scariest digital security stories of 2014 (so far)

The year's only halfway done, but hackers have already filled enough headlines to last a decade. read more »

The 10 biggest Edward Snowden leaks

One year ago, on June 5, 2013, The Washington Post published the first of Edward Snowden's leaks. Since then, many more revelations have come to light. Here are a look at 10 of the biggest. read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open