We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Network security

Network security News

CryptoWall held over half-a-million computers hostage, encrypted 5 billion files

The gang behind this dangerous ransomware program has earned US$1 million so far, researchers from Dell SecureWorks said read more »

Hillary Clinton: 'Our technology companies are not part of our government'

US companies are being unfairly tarred for perceived cooperation with the government, she said read more »

Mozilla reports user data leak from Bugzilla project

It's the second database exposure incident reported by the organization in a month read more »

NASA launches massive cloud migration

NASA migrated 65 software applications, including its flagship NASA.gov website to the cloud in 22 weeks, but the space agency is still in the midst of a massive deployment to the cloud. read more »

Retailers urged to defend against 'Backoff' point-of-sale malware

The PCI Security Standards Council says the Backoff malware is 'a very real threat' read more »

Broadcom wants to let 1,000 IoT devices bloom with $19.99 development kit

The WICED Sense Tag could help more Bluetooth Smart devices come to market read more »

more news ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Network security In Depth

Kicking the stool out from under the cybercrime economy

Cripple the automated processes presented by malware platforms and the threats aren't quite so serious read more »

Is the open plan office a data security headache?

Google and Facebook market their shared workspace and informality to potential recruits but... read more »

The making of a cybercrime market

Business analysis and online crime read more »

iOS 8 – What you need to know

Accenture's mobile expert gives businesses advice on how to prepare for the new Apple operating system read more »

ERP security: Protecting the pipeline by focusing on business-critical platforms

Develop a security baseline and measure systems against the baseline read more »

Car industrys biggest problem is moving from hardware to software

BMW’s outage presents the minefield manufacturers are navigating in the wake of the connected car. read more »

more in depth ..
Network security Slideshows

10 things you need to know about Red Hat Enterprise Linux 7

Red Hat Enterprise Linux 7 is more proof that operating systems aren’t dead, they’re becoming vessels for containerised applications. read more »

11 post-holiday checklist tips for CIOs

As the holiday period ends, it's a good time for your IT organisation to undertake some of those long put-off tasks. Here are tips from four CIOs and CTOs for cleaning up your IT environment. read more »

7 far-out technologies that are closer than you think

Some of these technology innovations sound like science fiction, but they may land in your data centre sooner than you'd imagine read more »

The 10 most terrifying security nightmares revealed at the Black Hat and Def Con hacker conferences

Hacked planes. Unstoppable, utterly malicious flash drives. Hotel automation gone crazy. These are the 10 most terrifying security stories out of the premier hacker and security conferences in Las Vegas. read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open