Encryption

Encryption News

Microsoft releases stopgap POODLE protection for Internet Explorer

Microsoft gave Windows customers an easier way to block attacks against Internet Explorer meant to steal browser session cookies and impersonate victims. read more »

Gigamon says it can analyze attacker SSL traffic without hitting performance

Attackers are increasingly using SSL to encrypt data they steal, which poses challenges for security read more »

California reports huge jump in data breaches

Annual report says records equivalent to almost half the state's residents were lost in 2013 read more »

Clues point to Russia in long-running spying campaign

'APT28' has predominantly focused on targets of interest to Russia, FireEye said read more »

Startup arms cops with Internet-connected 'smart' guns

A sensor in the guns could give departments better information about their use and make police more accountable read more »

Tor Project flags Russian 'exit node' server for delivering malware

The server used a technique to append malware to legitimate code read more »

more news ..
Encryption Blogs

Free Software (and Freedom) in Kosovo

Fighting surveillance with free software read more »

The Future of the Internet - 20 Years Ago

The birth of Netscape and its browser read more »

Say 'small footprint' again. I dare you

The terminology minimises the struggle involved in ensuring end point security read more »

An online kit for digital emergencies

A new EFF resource helps non-technical people deal with malware, intrusions and losses. read more »

more blogs ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Encryption In Depth

Big trends in big data analytics

Big data technologies and practices are moving quickly. Here's what you need to know to stay ahead of the game. read more »

Blowing the whistle without blowing your career

How techies can bring data mishandling and abuses to light without putting their careers in jeopardy. read more »

How an SME overcame technical hurdles to work with government

How an SME is working to gain IL3 certification to enable it to make its mark in the government supplier pool read more »

Why giving mobile apps banking info isn't as risky as it seems

The risks are no greater than transactions involving payment cards read more »

The hacker 'skills gap' may be more of a strategy gap

It feels like the bad guys are winning read more »

Is the open plan office a data security headache?

Google and Facebook market their shared workspace and informality to potential recruits but... read more »

more in depth ..
Encryption Slideshows

Open source and free software graveyard, 2014

We've tossed in a couple of freeware offerings that are no more as well read more »

Hot products at VMworld 2014

Click through all the products being released at VMworld last week read more »

7 far-out technologies that are closer than you think

Some of these technology innovations sound like science fiction, but they may land in your data centre sooner than you'd imagine read more »

Top 25 free tools for every Windows desktop

Whatever your poison -- Windows 7 or 8, updated or not -- there's a desktop tool just begging to become part of your repertoire read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open