Attack believed to have originated in China read more »
Mark Marmilev of Brooklyn maintained the technical infrastructure for Liberty Reserve's operations read more »
The new payment technology could put a dent in cyber criminals targeting retailer terminals read more »
Five million hacked passwords dumped on Russian cybercrime forums read more »
Apple Pay will not replace credit card in short term, claim industry experts read more »
Security experts are urging Gmail users to change their passwords after hackers gained access to the credentials of 5 million users of the free email service. read more »more news ..
Balancing the excitment of innovation with a security pro's natural caution read more »
If the attack happened in February or March, itâ€™s long past the point where a reset will stop possible secondary compromises read more »more blogs ..
Watch this on demand webinar which explores IT innovation, managed print services and business agility.
Check out our latest articles on Microsoft's next-generation operating system.
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.
Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.
Hacked In Depth
It feels like the bad guys are winning read more »
Here are four tips for preventing social engineering and DDoS hacks from ruining your business. read more »
Google and Facebook market their shared workspace and informality to potential recruits but... read more »
Cheating is on the rise, but IT certification programs are fighting back read more »
Insecure by design and trusted by default, embedded systems present security concerns that could prove crippling read more »
Didn't hackers get the memo? They were supposed to be exploiting the unpatched Windows XP read more »more in depth ..
Get a head start on the next tech boom by hacking together tomorrow’s Internet of things hit today read more »
Red Hat Enterprise Linux 7 is more proof that operating systems aren’t dead, they’re becoming vessels for containerised applications. read more »
Hacked planes. Unstoppable, utterly malicious flash drives. Hotel automation gone crazy. These are the 10 most terrifying security stories out of the premier hacker and security conferences in Las Vegas. read more »
Move over Donald Sterling. The exploits of these misbehaving technology executives give the now-infamous billionaire L.A. Clippers owner a run for his money when it comes to moronic acts. read more »more slideshows ..