We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Hacker

Hacker News

Thousands of sites compromised through WordPress plug-in vulnerability

Hackers are actively exploiting a vulnerability found recently in the MailPoet Newsletters plug-in for WordPress read more »

Hackers steal user data from the European Central Bank website, ask for money

The compromised information includes email addresses, phone numbers and physical contact addresses of ECB event participants read more »

ICO fines online travel services firm £150,000 over exposed personal data

Hacker steals over a million credit and debit card records read more »

Mozilla ships Firefox 31, adds search to new tab page

Patches 14 vulnerabilities, beefs up malware blocker read more »

Mt. Gox trustee leaves door open to revival of Bitcoin exchange

Investors meet the bankruptcy trustee, but get few answers read more »

SQL injection flaw in Wall Street Journal database led to breach

The publisher said the intrusion did not affect customers' data read more »

more news ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Hacker In Depth

For Your Eyes Only: Corporate espionage using social channels – is your company at risk?

Are businesses ensuring their employees remain vigilant in their personal online activities? read more »

Wearables: Are we handing more tools to Big Brother?

Fitness trackers and other wearables are all the rage, but privacy advocates warn that they come with the risk of a "privacy nightmare" read more »

Beware the next circle of hell: Unpatchable systems

Insecure by design and trusted by default, embedded systems present security concerns that could prove crippling read more »

XPocalypse, not now

Didn't hackers get the memo? They were supposed to be exploiting the unpatched Windows XP read more »

The ABC of the Internet of Things

There are no vendors large enough to control the IoT but vendors can make a mess of it. read more »

Windows XP scams target unsupported enterprise systems

What do enterprises need to be wary of now that XP is dead? read more »

more in depth ..
Hacker Slideshows

15 more hot Kickstarter tech campaigns

Projects hoping for financial backing include wind and solar chargers, drones and a panoramic video camera read more »

Eight ways the password is dying

From smartphones that know you’re near to tattoos and even pills, high-tech companies are busy replacing pesky strings of text with easier ways to authenticate. Check out the future here. read more »

The 8 scariest digital security stories of 2014 (so far)

The year's only halfway done, but hackers have already filled enough headlines to last a decade. read more »

Raspberry Pi hacks - Linux laptops and supercomputers

The Raspberry Pi is a stripped-down Linux PC consisting of a tiny circuit board, an ARM-based CPU, and a graphics processor - and inspiration for creative hacks read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open