The certificates were used to inspect encrypted traffic on a private network, Google said read more »
The Massachusetts senator is asking what carmakers are doing to prevent hacks of navigation, tire pressure, braking systems read more »
Many still run critical applications on the OS as well read more »
Some users are advised to change their passwords read more »
Easy-to-use encryption is the aim of Syme, a service built by three students in Montreal read more »
Attackers could start to aggressively distribute this malware in the near future, Kaspersky Lab researchers warn read more »more news ..
Hacker Blogsmore blogs ..
Watch this on demand webinar which explores IT innovation, managed print services and business agility.
Check out our latest articles on Microsoft's next-generation operating system.
Explore how you can improve your servers, storage and networks by developing your infrastructure.
Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.
Hacker In Depth
How many devices do you have on your home Wi-Fi? That many? Here are some strategies for optimizing your wireless performance. read more »
Around 1.4m people in US have top secret clearance so leaks will happen read more »
As hackers get stealthier and more vicious, security leaders across all industries need to be prepared read more »
Security pros and government officials warn of a possible cyber 9/11 involving banks, utilities, other companies, or the Internet read more »
Some of the most interesting, and amusing, tech-related quotes this year were uttered in courtrooms read more »
Virtually no one has even one decade of experience running major SaaS applications, so we should be prepared for some surprises read more »more in depth ..
The Raspberry Pi is a stripped-down Linux PC consisting of a tiny circuit board, an ARM-based CPU, and a graphics processor - and inspiration for creative hacks read more »
No, really, they're sorry! Vendors apologise in 2012 for everything from Apple Maps to Cisco Connect Cloud to outage after outage and breach after breach read more »
Take a tour of ICS-CERT facilities at Idaho National Labs read more »
The ten most significant blunders that the company has made in its short history read more »more slideshows ..