Jaguar Land Rover, Ford, AXA and Tata cars involved in the government-backed driverless car scheme read more »
LusyPOS appears to be a derivative of the Dexter and Chewbacca POS malware read more »
Security experts now believe that the Internet of Things will -- eventually -- be used for murderous purposes. read more »
A vulnerability in the Microsoft SChannel component could expose servers to remote code execution attacks read more »
The group infects the network access Web portals used by hotels and business centers to target specific guests read more »
The company is acquiring Maginatics, Spanning and Cloudscaling read more »more news ..
we are all targets read more »
Lots of noise, too few surprises and too little differentiation read more »
Be pragmatic, You can't protect everything read more »more blogs ..
Watch this on demand webinar which explores IT innovation, managed print services and business agility.
Check out our latest articles on Microsoft's next-generation operating system.
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.
Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.
RSA In Depth
Changing career focus can surprise you read more »
Robots in all shapes and sizes are starting to work alongside people more closely than ever read more »
Hackers, from the opportunistic to bitcoin-stealing specialists, try to get in on the action, say researchers who tallied malware targeting the virtual currencies read more »
The high number of attendees and exhibitors at security event are indication of troubled times read more »
Everything but the simplest of attacks will occur over multiple stages and actions, allowing you to analyse and act read more »
On the other hand, it could also be equally bad for Samsung read more »more in depth ..
Lost track of how many people have been in charge of Universal Credit so far? We’re here to help. read more »
Former Microsoft CTO recalls the first enterprise grade email platform and his original startup read more »
It's not just your boss or the government that's spying on you, it's also the devices and technologies you embrace. read more »
One year ago, on June 5, 2013, The Washington Post published the first of Edward Snowden's leaks. Since then, many more revelations have come to light. Here are a look at 10 of the biggest. read more »more slideshows ..