We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Hacked

Hacked News

NSA spying revelations have tired out China's Huawei

Huawei has for years fought off allegations that it spies for China read more »

How to keep your smartphone (and its data) secure

These tips and tools can help you keep your smartphone close, and protect your data if it strays read more »

Bank of England plans new round of cyber resiliency tests for UK banks

Regulator to focus on individual banks’ security systems read more »

Web apps and point-of-sale were leading hacker targets in 2013, says Verizon

The telco's annual data breach report incorporates data from more sources than ever before read more »

SEC seeks data on cyber security policies at Wall Street firms

Cyber defenses at more than 50 broker-dealers and investment advisers will be assessed by federal examiners read more »

Investors try last-minute Mt. Gox revival as liquidation looms

A consortium that offered 1 bitcoin to buy Mt. Gox launches its own website read more »

more news ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Hacked In Depth

How to convince the Financial Director to upgrade to Windows 8

Is Microsoft's latest operating system a better investment than XP? read more »

Bitcoin malware count soars as cryptocurrency value climbs

Hackers, from the opportunistic to bitcoin-stealing specialists, try to get in on the action, say researchers who tallied malware targeting the virtual currencies read more »

Huge turnout at RSA shows bad guys are winning

The high number of attendees and exhibitors at security event are indication of troubled times read more »

US NIST cybersecurity framework gets mixed reviews

Critical infrastructure is so hard to defend read more »

Westminster View: Engineers are not to blame for mass surveillance

The widespread spying unveiled by Edward Snowden raises questions about the UK’s digital legislative framework that requires more technical knowledge from people on all sides of the debate, says cyber security shadow minister Chi Onwurah read more »

How to balance maintenance and IT innovation

If too much of your budget goes on keeping the lights on, maybe the budget is wrong read more »

more in depth ..
Hacked Slideshows

Wearables at Mobile World Congress

The best of what we saw read more »

IT turkeys of the year

The bad, sad and plain stupid read more »

Raspberry Pi hacks - Linux laptops and supercomputers

The Raspberry Pi is a stripped-down Linux PC consisting of a tiny circuit board, an ARM-based CPU, and a graphics processor - and inspiration for creative hacks read more »

The sorriest tech companies of 2012

No, really, they're sorry! Vendors apologise in 2012 for everything from Apple Maps to Cisco Connect Cloud to outage after outage and breach after breach read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open