We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Hacker

Hacker News

Why would Chinese hackers want hospital patient data?

Medical records data can be a valuable asset, especially in a country where many have no health insurance read more »

Microsoft offers custom Windows OS to all first generation Intel Galileo owners

The company says it is committed to supporting the second generation as well read more »

About 4.5M face risk of ID theft after hack of hospital network

Community Health Systems says Chinese hackers accessed names, social security numbers and other data of people it treated or referred read more »

Hackers steal data on 4.5 million US hospital patients

Community Health Systems says the breach occurred in April and June read more »

Former employees have become 'application menace' new study claims

Salesforce, PayPal, SharePoint, Facebook, Google Apps... read more »

Two US supermarket chains report major computer break-ins

Up to 1,000 stores may be affected read more »

more news ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Hacker In Depth

Car industrys biggest problem is moving from hardware to software

BMW’s outage presents the minefield manufacturers are navigating in the wake of the connected car. read more »

For Your Eyes Only: Corporate espionage using social channels – is your company at risk?

Are businesses ensuring their employees remain vigilant in their personal online activities? read more »

Wearables: Are we handing more tools to Big Brother?

Fitness trackers and other wearables are all the rage, but privacy advocates warn that they come with the risk of a "privacy nightmare" read more »

Beware the next circle of hell: Unpatchable systems

Insecure by design and trusted by default, embedded systems present security concerns that could prove crippling read more »

XPocalypse, not now

Didn't hackers get the memo? They were supposed to be exploiting the unpatched Windows XP read more »

The ABC of the Internet of Things

There are no vendors large enough to control the IoT but vendors can make a mess of it. read more »

more in depth ..
Hacker Slideshows

The 10 most terrifying security nightmares revealed at the Black Hat and Def Con hacker conferences

Hacked planes. Unstoppable, utterly malicious flash drives. Hotel automation gone crazy. These are the 10 most terrifying security stories out of the premier hacker and security conferences in Las Vegas. read more »

Six tips to protect employees from phishing attacks

Make sure no-one gets a good catch at an employee's expense - consumer security provider BullGuard has put together a few tips on Phishing prevention read more »

11 Android tools for web developers

Android mobile devices, while not typically thought of as places where development work gets done, can offer surprisingly useful apps to help developers get the job done, anywhere. read more »

15 more hot Kickstarter tech campaigns

Projects hoping for financial backing include wind and solar chargers, drones and a panoramic video camera read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open