Encryption

Encryption News

Early version of new POS malware family spotted

Dozens of antivirus programs are missing Getmypass, which is similar to BlackPOS read more »

Over 23,000 Web servers infected with CryptoPHP backdoor

The backdoor script is distributed through pirated plug-ins and themes for WorPress, Joomla and Drupal read more »

Siemens patches critical SCADA flaws likely exploited in recent attacks

The vulnerabilities allow remote attackers to extract files from WinCC SCADA servers and execute arbitrary code on them read more »

San Francisco DA pushes for chip payment cards in tech's backyard

Chip-and-PIN technology in credit and debit cards is designed to curb theft and fraud read more »

Twitter, in time for the holidays, puts digital coupons in your feed

The tool requires people to store their payment information with Twitter read more »

Regin malware linked to attacks on Belgacom, well-known cryptographer

Regin's targets have lead to suspicions that the U.S. and U.K. may have created it read more »

more news ..
Encryption Blogs

Help Defend EU Net Neutrality (Yes, Again)

Urgent: please act now read more »

The Coming War on Encryption, Tor, and VPNs

Time to stand up for your right to online privacy read more »

Firefox Leans Towards the Vertical

Mozilla's next 10 years read more »

Privacy Becomes A Competitive Differentiator In 2015

Are you in tune with your customers' attitudes? read more »

more blogs ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Encryption In Depth

Privacy is the new killer app

Ello, Wiper, Anonabox and others prove that Apple, Facebook and the like can't rest on their laurels when it comes to security. read more »

GE Capital's CTO sees the death of PCs, the rise of phablets

Even though the term "phablet" draws a lot of snarky comments, GE Capital CTO Eric Reed thinks they'll overtake PCs in a few years. read more »

New PCI council leader ready to take on the hackers

Payment Card Industry Security Standards Council leader warns against complaince complacency read more »

How the Internet of Things is transforming US law enforcement

From connected guns to wearables for canine units, the IoT is spurring change in the law enforcement field. read more »

Big trends in big data analytics

Big data technologies and practices are moving quickly. Here's what you need to know to stay ahead of the game. read more »

Blowing the whistle without blowing your career

How techies can bring data mishandling and abuses to light without putting their careers in jeopardy. read more »

more in depth ..
Encryption Slideshows

Open source and free software graveyard, 2014

We've tossed in a couple of freeware offerings that are no more as well read more »

Hot products at VMworld 2014

Click through all the products being released at VMworld last week read more »

7 far-out technologies that are closer than you think

Some of these technology innovations sound like science fiction, but they may land in your data centre sooner than you'd imagine read more »

Top 25 free tools for every Windows desktop

Whatever your poison -- Windows 7 or 8, updated or not -- there's a desktop tool just begging to become part of your repertoire read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open