The Kace K1000 enterprise asset management software can also keep tabs on many other types of devices read more »
CryptoWall 3.0 uses both the Tor and I2P anonymity networks for increased stealthiness read more »
The supermarket brought in Computacenter to deploy a Cisco IP telephony system read more »
Users should install firmware updates as soon as they become available and should block untrusted devices on their networks read more »
A new gateway feature can give users remote access to multiple AllJoyn devices read more »
The tool can disconnect Wi-Fi users and trick them into disclosing their access password to a rogue access point read more »more news ..
Good progress, but more needed on security read more »
When home security requires levels of expertise found in an SME, BYOD poses problems read more »
FOSDEM is the most important meeting ground for the world's open source developers, and you can attend free of charge. Will you be there? read more »more blogs ..
Watch this on demand webinar which explores IT innovation, managed print services and business agility.
Check out our latest articles on Microsoft's next-generation operating system.
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.
Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.
Router In Depth
Banish unrealistic expectations by following these guidelines read more »
Ello, Wiper, Anonabox and others prove that Apple, Facebook and the like can't rest on their laurels when it comes to security. read more »
From connected guns to wearables for canine units, the IoT is spurring change in the law enforcement field. read more »
How techies can bring data mishandling and abuses to light without putting their careers in jeopardy. read more »
Ocado Technology's COO explains why it, and other companies, should help bridge the technology gender gap read more »
Automation is a logical next step in the SDN migration journey. read more »more in depth ..
Hacked planes. Unstoppable, utterly malicious flash drives. Hotel automation gone crazy. These are the 10 most terrifying security stories out of the premier hacker and security conferences in Las Vegas. read more »
Microsoft leads the way, but has plenty of company on jobs cut front read more »
Projects hoping for financial backing include wind and solar chargers, drones and a panoramic video camera read more »
The Internet of Things is changing simple homes into smart homes, where everything from your lights to your locks can be controlled from your smartphone. Here are a few products that can help you get started. read more »more slideshows ..