We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Hacker

Hacker News

Tip of the Hat: Heartbleed prompts chastened tech giants to fund OpenSSL

Ars Technica explains how a potential disaster finally convinced top tech firms to fund development of open source software they have been using for years. read more »

Privacy jitters derail controversial K-12 big data initiative

InBloom said its initiative would have allowed schools to offer customized instruction to students read more »

While Heartbleed distracts, hackers hit US universities

As many as 250,000 people could be affected by a wave of attacks not using Heartbleed read more »

Web apps and point-of-sale were leading hacker targets in 2013, says Verizon

The telco's annual data breach report incorporates data from more sources than ever before read more »

CloudFlare launches bug bounty program

The company hopes to strengthen its network through crowd-based bug hunting read more »

Investors try last-minute Mt. Gox revival as liquidation looms

A consortium that offered 1 bitcoin to buy Mt. Gox launches its own website read more »

more news ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Hacker In Depth

Windows 8 and BitLocker: how to encrypt company laptops

Data protection using Windows 8 read more »

How to make enterprise XP apps work with Windows 8.1

How to efficiently migrate your organisation to Windows 8.1 read more »

The clock is ticking for Windows XP; is your business ready?

On 8th April 2014, support for Windows XP will come to an end. Is your business ready? read more »

Bitcoin malware count soars as cryptocurrency value climbs

Hackers, from the opportunistic to bitcoin-stealing specialists, try to get in on the action, say researchers who tallied malware targeting the virtual currencies read more »

Huge turnout at RSA shows bad guys are winning

The high number of attendees and exhibitors at security event are indication of troubled times read more »

The 25 worst passwords of 2013

'Password' is dethroned but the new champion isn't much better read more »

more in depth ..
Hacker Slideshows

Raspberry Pi hacks - Linux laptops and supercomputers

The Raspberry Pi is a stripped-down Linux PC consisting of a tiny circuit board, an ARM-based CPU, and a graphics processor - and inspiration for creative hacks read more »

The sorriest tech companies of 2012

No, really, they're sorry! Vendors apologise in 2012 for everything from Apple Maps to Cisco Connect Cloud to outage after outage and breach after breach read more »

Inside the US government's cyber security headquarters

Take a tour of ICS-CERT facilities at Idaho National Labs read more »

Facebook's ten biggest strategic mistakes

The ten most significant blunders that the company has made in its short history read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open