British hackers Topiary, Kayla, T-Flow and Viral received prison sentences for their roles in LulzSec's 2011 cyberattacks read more »
New numbering scheme necessary to take into account increase in zero-day patches read more »
Snapdragon-enabled mobile devices will come preloaded with Kaspersky Security read more »
US federal prosecutors indicted eight people accused of running a vast carding scheme read more »
Stolen data is used to ramp up China's military and high tech industries, Defense Department says in report to Congress read more »
Researchers with Cylance found a Google office in Sydney used an unpatched building control system read more »more news ..
Hacker Blogsmore blogs ..
On demand Biztech Briefing-Learn how to effectively deliver mobile work styles and cloud services together.
Check out our latest articles on Microsoft's next-generation operating system.
View the latest capacity management resources including whitepapers, videos and news.
Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.
Hacker In Depth
Security pros and government officials warn of a possible cyber 9/11 involving banks, utilities, other companies, or the Internet read more »
Some of the most interesting, and amusing, tech-related quotes this year were uttered in courtrooms read more »
Virtually no one has even one decade of experience running major SaaS applications, so we should be prepared for some surprises read more »
Canonical has touted its new OS as a good way to 'avoid the pain of Windows 8' - Here's why you should take up the challenge read more »
To properly protect your company against attacks, it's imperative that you take precautions read more »
Whether thieves or tornadoes threaten your company, protecting your assets from utter catastrophe is easier than you think. read more »more in depth ..
The Raspberry Pi is a stripped-down Linux PC consisting of a tiny circuit board, an ARM-based CPU, and a graphics processor - and inspiration for creative hacks read more »
No, really, they're sorry! Vendors apologise in 2012 for everything from Apple Maps to Cisco Connect Cloud to outage after outage and breach after breach read more »
Take a tour of ICS-CERT facilities at Idaho National Labs read more »
The ten most significant blunders that the company has made in its short history read more »more slideshows ..