Hacked

Hacked News

Researcher creates proof-of-concept worm for network-attached storage devices

Infecting NAS devices with malware can be very valuable for attackers, a researcher said read more »

China again blames US for disrupted cybersecurity talks

A top Chinese official said the country does not tolerate hacking read more »

Apple patches OS X to protect against POODLE

Apple has issued a security update for OS X Mavericks and Mountain Lion meant to protect Macs against possible POODLE attacks. read more »

Hackers strike defense companies through real-time ad bidding

Malicious advertisements are being 'micro-targeted' at defense companies, Invincea said read more »

Snapchat and other online services need to tighten security

Regardless of the fact that some data leaks weren't the result of direct server hacks, Internet service companies need to do a better job of educating their users and offering stronger security measures. read more »

FBI warns of cyberattacks linked to China

The FBI and security companies have observed 'recent intrusions' read more »

more news ..
Hacked Blogs

CoreOS: Open Source Future of Enterprise Computing?

open source in the enterprise read more »

Russia Government Chooses GNU/Linux with Chips

read more »

The connected car as a microcosm of the new threat landscape

Balancing the excitment of innovation with a security pro's natural caution read more »

The eBay breach: Big brands can no longer protect their users

If the attack happened in February or March, it’s long past the point where a reset will stop possible secondary compromises read more »

more blogs ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Hacked In Depth

The human OS: Overdue for a social engineering patch

Experts say training -- done well and frequently -- can make employees much more difficult to 'hack' read more »

The hacker 'skills gap' may be more of a strategy gap

It feels like the bad guys are winning read more »

Four small business security lessons from real-life hacks

Here are four tips for preventing social engineering and DDoS hacks from ruining your business. read more »

Is the open plan office a data security headache?

Google and Facebook market their shared workspace and informality to potential recruits but... read more »

Pirates, cheats and IT certs

Cheating is on the rise, but IT certification programs are fighting back read more »

Beware the next circle of hell: Unpatchable systems

Insecure by design and trusted by default, embedded systems present security concerns that could prove crippling read more »

more in depth ..
Hacked Slideshows

12 surprising ways personal technology betrays your privacy

It's not just your boss or the government that's spying on you, it's also the devices and technologies you embrace. read more »

Apple's rotten week: Bent phones, broken software, and shattered security

The only magic in Apple land last week was black magic. read more »

See how Morgan Motors is shaping itself as a modern business through IT

Quirky British car-makers' technology lead talks ComputerworldUK through its infrastructure and future plans read more »

9 Rules for the Developer-isation of IT

CIOs who want to drive innovation and change in their organisations should focus on making the lives of developers easier so they can innovate, produce great apps and deliver valuable IP read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open