The attack changes the DNS settings of a router using default login credentials, Proofpoint said read more »
Sales of Cisco's key products for software-defined networking are growing fast, the company says read more »
More flexibility for customers not yet opting for a full-blown app policy infrastructure. read more »
The Kace K1000 enterprise asset management software can also keep tabs on many other types of devices read more »
CryptoWall 3.0 uses both the Tor and I2P anonymity networks for increased stealthiness read more »
The supermarket brought in Computacenter to deploy a Cisco IP telephony system read more »more news ..
Cloud Will Transform Managed Security Services read more »
Good progress, but more needed on security read more »
When home security requires levels of expertise found in an SME, BYOD poses problems read more »more blogs ..
Watch this on demand webinar which explores IT innovation, managed print services and business agility.
Check out our latest articles on Microsoft's next-generation operating system.
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.
Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.
Router In Depth
Banish unrealistic expectations by following these guidelines read more »
Ello, Wiper, Anonabox and others prove that Apple, Facebook and the like can't rest on their laurels when it comes to security. read more »
From connected guns to wearables for canine units, the IoT is spurring change in the law enforcement field. read more »
How techies can bring data mishandling and abuses to light without putting their careers in jeopardy. read more »
Ocado Technology's COO explains why it, and other companies, should help bridge the technology gender gap read more »
Automation is a logical next step in the SDN migration journey. read more »more in depth ..
Dreaming of a smart home? UK retailers are stocking simple IoT products to make it a reality read more »
Hacked planes. Unstoppable, utterly malicious flash drives. Hotel automation gone crazy. These are the 10 most terrifying security stories out of the premier hacker and security conferences in Las Vegas. read more »
Microsoft leads the way, but has plenty of company on jobs cut front read more »
Projects hoping for financial backing include wind and solar chargers, drones and a panoramic video camera read more »more slideshows ..
Maximise the effectiveness of collaboration read more »
You own the number, they own the phone. read more »more white papers ..