Bitdefender BOX can replace or run alongside a home router to scan all network traffic for security threats read more »
Shipments are expected to decline by 24 percent year on year read more »
Insecam, which broadcast feeds from unsecured webcams, no longer works read more »
A USB-stick computer built around a processor with strong security capabilities read more »
Apple today released the first update to OS X Yosemite that included fixes for unspecified Wi-Fi problems and improved reliability for connecting to Microsoft Exchange corporate email servers. read more »
Attackers use malware dubbed Bashlite to scan for and install backdoors on routers and other systems running BusyBox read more »more news ..
When home security requires levels of expertise found in an SME, BYOD poses problems read more »
FOSDEM is the most important meeting ground for the world's open source developers, and you can attend free of charge. Will you be there? read more »more blogs ..
Watch this on demand webinar which explores IT innovation, managed print services and business agility.
Check out our latest articles on Microsoft's next-generation operating system.
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.
Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.
Router In Depth
Ello, Wiper, Anonabox and others prove that Apple, Facebook and the like can't rest on their laurels when it comes to security. read more »
From connected guns to wearables for canine units, the IoT is spurring change in the law enforcement field. read more »
How techies can bring data mishandling and abuses to light without putting their careers in jeopardy. read more »
Ocado Technology's COO explains why it, and other companies, should help bridge the technology gender gap read more »
Automation is a logical next step in the SDN migration journey. read more »
Develop a security baseline and measure systems against the baseline read more »more in depth ..
Hacked planes. Unstoppable, utterly malicious flash drives. Hotel automation gone crazy. These are the 10 most terrifying security stories out of the premier hacker and security conferences in Las Vegas. read more »
Microsoft leads the way, but has plenty of company on jobs cut front read more »
Projects hoping for financial backing include wind and solar chargers, drones and a panoramic video camera read more »
The Internet of Things is changing simple homes into smart homes, where everything from your lights to your locks can be controlled from your smartphone. Here are a few products that can help you get started. read more »more slideshows ..
Maximise the effectiveness of collaboration read more »
Should you be embracing ADC Clustering? read more »more white papers ..