Hacked

Hacked News

Microsoft patch fixed IE flaw used against U.S. military

Attack believed to have originated in China read more »

CTO for Liberty Reserve payment network pleads guilty

Mark Marmilev of Brooklyn maintained the technical infrastructure for Liberty Reserve's operations read more »

How Apple Pay could make the Target and Home Depot breaches a thing of the past

The new payment technology could put a dent in cyber criminals targeting retailer terminals read more »

What you need to know about the Gmail password compromise

Five million hacked passwords dumped on Russian cybercrime forums read more »

Apple iPhone 6 launch set to impact payments but real uptake could be years away

Apple Pay will not replace credit card in short term, claim industry experts read more »

Hackers compromised nearly 5M Gmail passwords

Security experts are urging Gmail users to change their passwords after hackers gained access to the credentials of 5 million users of the free email service. read more »

more news ..
Hacked Blogs

Russia Government Chooses GNU/Linux with Chips

read more »

The connected car as a microcosm of the new threat landscape

Balancing the excitment of innovation with a security pro's natural caution read more »

The eBay breach: Big brands can no longer protect their users

If the attack happened in February or March, it’s long past the point where a reset will stop possible secondary compromises read more »

Whither Mozilla?

read more »

more blogs ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Hacked In Depth

The hacker 'skills gap' may be more of a strategy gap

It feels like the bad guys are winning read more »

Four small business security lessons from real-life hacks

Here are four tips for preventing social engineering and DDoS hacks from ruining your business. read more »

Is the open plan office a data security headache?

Google and Facebook market their shared workspace and informality to potential recruits but... read more »

Pirates, cheats and IT certs

Cheating is on the rise, but IT certification programs are fighting back read more »

Beware the next circle of hell: Unpatchable systems

Insecure by design and trusted by default, embedded systems present security concerns that could prove crippling read more »

XPocalypse, not now

Didn't hackers get the memo? They were supposed to be exploiting the unpatched Windows XP read more »

more in depth ..
Hacked Slideshows

Move over, Raspberry Pi: 7 single-board computers for geeks

Get a head start on the next tech boom by hacking together tomorrow’s Internet of things hit today read more »

10 things you need to know about Red Hat Enterprise Linux 7

Red Hat Enterprise Linux 7 is more proof that operating systems aren’t dead, they’re becoming vessels for containerised applications. read more »

The 10 most terrifying security nightmares revealed at the Black Hat and Def Con hacker conferences

Hacked planes. Unstoppable, utterly malicious flash drives. Hotel automation gone crazy. These are the 10 most terrifying security stories out of the premier hacker and security conferences in Las Vegas. read more »

Silicon Valley tech execs behaving badly

Move over Donald Sterling. The exploits of these misbehaving technology executives give the now-infamous billionaire L.A. Clippers owner a run for his money when it comes to moronic acts. read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open