Place security higher up the supply chain, as parts that come from different suppliers could reveal vulnerabilities, experts warn read more »
Researchers found leaked documentation for application programming interfaces to interact with ATM devices read more »
The malware is installed from a bootable CD by first gaining physical access to the ATM read more »
Public Malware Investigator portal nears launch read more »
Attack believed to have originated in China read more »more news ..
Caesar, infrastructure, outsourcing and offshoring read more »more blogs ..
Watch this on demand webinar which explores IT innovation, managed print services and business agility.
Check out our latest articles on Microsoft's next-generation operating system.
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.
Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.
Kaspersky In Depth
Business analysis and online crime read more »
Symantec said it tried to break the hash with brute force attacks but failed read more »
New technologies like the Intel Xeon E5-2600 product family are coming to market that work at the server processor level read more »
Check out the hot six up-and-coming security companies in the industy read more »
Fequently asked questions about the latest Trojan infeciton read more »
McAfee have released a set of five tips to help ensure that your smartphone remains secure and free of potentially harmful mobile apps read more »more in depth ..
Whatever your poison -- Windows 7 or 8, updated or not -- there's a desktop tool just begging to become part of your repertoire read more »more slideshows ..