Hacker

Hacker News

OpenVPN servers can be vulnerable to Shellshock Bash vulnerability

Some OpenVPN configuration options open remote attack vectors for Bash vulnerabilities, VPN provider warns read more »

Hacked celebrities 'dumb', says proposed EU digital commissioner

Legislation can't protect people from their own stupidity, Günther Oettinger told the European Parliament during his confirmation hearing read more »

Global Internet speeds up, DDoS attacks down

The average global Internet connection speed rose above 4Mbps for the first time. read more »

China clears iPhone 6 for sale only after security tweaks

A Chinese regulator has claimed it found security flaws in Apple's iOS software that could steal user's data read more »

CloudFlare aims to simplify SSL encryption with free service

Having encryption is critical to advancing a more secure future of the Internet, according to CloudFlare read more »

VoIP phone systems at risk of Shellshock Bash attacks

Some botnet operators are repurposing DDoS bots in attempt to exploit Shellshock. read more »

more news ..
Hacker Blogs

OpenStreetMap: the Next Truly Indispensable Open Project

read more »

The eBay security breach - more lessons to learn

The consequences of the eBay breach may not be known for some time read more »

The eBay breach: Big brands can no longer protect their users

If the attack happened in February or March, it’s long past the point where a reset will stop possible secondary compromises read more »

Securing mobile development: Nontechnical solutions

Tools and services are necessary but changing culture is essential read more »

more blogs ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Hacker In Depth

The hacker 'skills gap' may be more of a strategy gap

It feels like the bad guys are winning read more »

Four small business security lessons from real-life hacks

Here are four tips for preventing social engineering and DDoS hacks from ruining your business. read more »

Car industrys biggest problem is moving from hardware to software

BMW’s outage presents the minefield manufacturers are navigating in the wake of the connected car. read more »

For Your Eyes Only: Corporate espionage using social channels – is your company at risk?

Are businesses ensuring their employees remain vigilant in their personal online activities? read more »

Wearables: Are we handing more tools to Big Brother?

Fitness trackers and other wearables are all the rage, but privacy advocates warn that they come with the risk of a "privacy nightmare" read more »

Beware the next circle of hell: Unpatchable systems

Insecure by design and trusted by default, embedded systems present security concerns that could prove crippling read more »

more in depth ..
Hacker Slideshows

9 Rules for the Developer-isation of IT

CIOs who want to drive innovation and change in their organisations should focus on making the lives of developers easier so they can innovate, produce great apps and deliver valuable IP read more »

Aspiring cyber defenders battle it out in GCHQ competition

50 people investigated a cyber attack simulated by the intelligence agency read more »

The worst cloud outages of 2014 (so far)

Which companies have failed the worst when it comes to cloud outages in 2014? Time for the list no one wants to land on read more »

The 10 most terrifying security nightmares revealed at the Black Hat and Def Con hacker conferences

Hacked planes. Unstoppable, utterly malicious flash drives. Hotel automation gone crazy. These are the 10 most terrifying security stories out of the premier hacker and security conferences in Las Vegas. read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open