The flaws can be exploited to gain unauthorized access or cause denial-of-service conditions read more »
Residents of a dorm can name their own networks and set policies while sharing access points read more »
Attackers have used a variety of techniques to exploit known vulnerabilities in router models from different manufacturers read more »
The first step, in-car wireless infotainment systems, set for mass rollouts this year; experts say extending that to smart highways is a massive task read more »
Using TOR makes it more difficult to trace the command-and-control server read more »
Cloud systems need improved interoperability read more »more news ..
Router Blogsmore blogs ..
Watch this on demand webinar which explores IT innovation, managed print services and business agility.
Check out our latest articles on Microsoft's next-generation operating system.
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.
Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.
Router In Depth
Like it or not, commerce increasingly involves keeping tabs on the customer's location. read more »
After a DDoS attack is discovered by chance, the audit can no longer wait until later in the year. read more »
How many devices do you have on your home Wi-Fi? That many? Here are some strategies for optimizing your wireless performance. read more »
From software defined networking challenges to killing Cius and corporate restricting moves, it was a busy year for Cisco read more »
Whether thieves or tornadoes threaten your company, protecting your assets from utter catastrophe is easier than you think. read more »
Given the explosive growth in data traffic, Moore's Law is not enough to keep pace with demand for higher network speeds read more »more in depth ..
Cisco's 'Internet of Everything' initiative takes it into unchartered territory read more »
Here are some of the best-known free security tools you can try inside your own network read more »
No, really, they're sorry! Vendors apologise in 2012 for everything from Apple Maps to Cisco Connect Cloud to outage after outage and breach after breach read more »
Which of today's newest shipping technologies will cast the longest shadow over business computing? read more »more slideshows ..
Maximise the effectiveness of collaboration read more »
Help you with your selection process read more »more white papers ..