Continuous endpoint monitoring plus one touch attack termination on offer read more »
Users trying to reach the airline's website found a graphic from Lizard Squad read more »
Microsoft's email service was briefly hit with a "man-in-the-middle" attack on Saturday read more »
The attacks have been beating fraud detection systems read more »
The exploit was included in the Angler exploit kit, a security researcher reported read more »
One million customers compromised in 2014 hack read more »more news ..
Security is too often seen as an anxiety for the specialists read more »
The Chinese are coming - very rapidly read more »
More amazing ideas read more »
Fighting surveillance with free software read more »more blogs ..
Watch this on demand webinar which explores IT innovation, managed print services and business agility.
Check out our latest articles on Microsoft's next-generation operating system.
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.
Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.
Hacker In Depth
Visual hacking, social engineering and insiders threat remain the challenge read more »
Payment Card Industry Security Standards Council leader warns against complaince complacency read more »
Experts say training -- done well and frequently -- can make employees much more difficult to 'hack' read more »
It feels like the bad guys are winning read more »
Here are four tips for preventing social engineering and DDoS hacks from ruining your business. read more »
BMW’s outage presents the minefield manufacturers are navigating in the wake of the connected car. read more »more in depth ..
Following Amazon's fire on Friday, ComputerworldUK picks out the most unexpected data centre disasters read more »
It's not just your boss or the government that's spying on you, it's also the devices and technologies you embrace. read more »
CIOs who want to drive innovation and change in their organisations should focus on making the lives of developers easier so they can innovate, produce great apps and deliver valuable IP read more »
50 people investigated a cyber attack simulated by the intelligence agency read more »more slideshows ..