Some OpenVPN configuration options open remote attack vectors for Bash vulnerabilities, VPN provider warns read more »
Legislation can't protect people from their own stupidity, Günther Oettinger told the European Parliament during his confirmation hearing read more »
The average global Internet connection speed rose above 4Mbps for the first time. read more »
A Chinese regulator has claimed it found security flaws in Apple's iOS software that could steal user's data read more »
Having encryption is critical to advancing a more secure future of the Internet, according to CloudFlare read more »
Some botnet operators are repurposing DDoS bots in attempt to exploit Shellshock. read more »more news ..
The consequences of the eBay breach may not be known for some time read more »
If the attack happened in February or March, itâ€™s long past the point where a reset will stop possible secondary compromises read more »
Tools and services are necessary but changing culture is essential read more »more blogs ..
Watch this on demand webinar which explores IT innovation, managed print services and business agility.
Check out our latest articles on Microsoft's next-generation operating system.
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.
Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.
Hacker In Depth
It feels like the bad guys are winning read more »
Here are four tips for preventing social engineering and DDoS hacks from ruining your business. read more »
BMW’s outage presents the minefield manufacturers are navigating in the wake of the connected car. read more »
Are businesses ensuring their employees remain vigilant in their personal online activities? read more »
Fitness trackers and other wearables are all the rage, but privacy advocates warn that they come with the risk of a "privacy nightmare" read more »
Insecure by design and trusted by default, embedded systems present security concerns that could prove crippling read more »more in depth ..
CIOs who want to drive innovation and change in their organisations should focus on making the lives of developers easier so they can innovate, produce great apps and deliver valuable IP read more »
50 people investigated a cyber attack simulated by the intelligence agency read more »
Which companies have failed the worst when it comes to cloud outages in 2014? Time for the list no one wants to land on read more »
Hacked planes. Unstoppable, utterly malicious flash drives. Hotel automation gone crazy. These are the 10 most terrifying security stories out of the premier hacker and security conferences in Las Vegas. read more »more slideshows ..