Hacker

Hacker News

Carbon Black 5.0 released to help security teams respond faster

Continuous endpoint monitoring plus one touch attack termination on offer read more »

Malaysia Airlines attacked, big data dump threatened

Users trying to reach the airline's website found a graphic from Lizard Squad read more »

China denies involvement in Outlook.com attack

Microsoft's email service was briefly hit with a "man-in-the-middle" attack on Saturday read more »

Sharp rise seen in attacks using stolen credentials

The attacks have been beating fraud detection systems read more »

Attackers are exploiting a zero-day vulnerability in Flash Player

The exploit was included in the Angler exploit kit, a security researcher reported read more »

Shoe retailer Office escapes ICO fine despite serious data breach

One million customers compromised in 2014 hack read more »

more news ..
Hacker Blogs

How can SMEs afford security that is good enough?

Security is too often seen as an anxiety for the specialists read more »

2015: the Year of Open Source with Chinese Characteristics?

The Chinese are coming - very rapidly read more »

New Projects from the Ever-Protean World of Open Source

More amazing ideas read more »

Free Software (and Freedom) in Kosovo

Fighting surveillance with free software read more »

more blogs ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Hacker In Depth

3 low-tech threats that lead to high-profile breaches

Visual hacking, social engineering and insiders threat remain the challenge read more »

New PCI council leader ready to take on the hackers

Payment Card Industry Security Standards Council leader warns against complaince complacency read more »

The human OS: Overdue for a social engineering patch

Experts say training -- done well and frequently -- can make employees much more difficult to 'hack' read more »

The hacker 'skills gap' may be more of a strategy gap

It feels like the bad guys are winning read more »

Four small business security lessons from real-life hacks

Here are four tips for preventing social engineering and DDoS hacks from ruining your business. read more »

Car industrys biggest problem is moving from hardware to software

BMW’s outage presents the minefield manufacturers are navigating in the wake of the connected car. read more »

more in depth ..
Hacker Slideshows

Top 10 data centre disasters

Following Amazon's fire on Friday, ComputerworldUK picks out the most unexpected data centre disasters read more »

12 surprising ways personal technology betrays your privacy

It's not just your boss or the government that's spying on you, it's also the devices and technologies you embrace. read more »

9 Rules for the Developer-isation of IT

CIOs who want to drive innovation and change in their organisations should focus on making the lives of developers easier so they can innovate, produce great apps and deliver valuable IP read more »

Aspiring cyber defenders battle it out in GCHQ competition

50 people investigated a cyber attack simulated by the intelligence agency read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open