We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Sophos

Sophos News

What you need to do about Heartbleed

The Heartbleed bug has affected about two-thirds of the worlds websites read more »

FAQ: Good-bye old pal, old paint, Windows XP

Windows XP falls off the Microsoft patch list after today. Here's why, and what it means to you read more »

Gameover malware targets accounts on employment websites

In addition to CareerBuilder, new variants of the Trojan program target Monster.com, researchers from F-Secure said read more »

Latest Word zero-day similar to exploits in other targeted attacks

Exploits involved booby-trapped Rich Text Format file and Microsoft Outlook email read more »

Gameover malware tougher to kill with new rootkit component

The rootkit works on 32-bit and 64-bit Windows versions and protects the malware's components from being deleted read more »

The Syrian Electronic Army wins again as 1 million Forbes accounts breached

Weak password security exposed read more »

more news ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Sophos In Depth

Free popular mobile apps pose security risks just as much as rogue apps

What if an app uploads a sales representatives' contact list and the developer then sells it to a competitor? read more »

Six ways to protect against the new actively exploited Java vulnerability

Security researchers proposed several methods to protect computers from being compromised via a new Java vulnerability read more »

LinkedIn seeks to assure users following password hack

Social networking company has little new to say about how 6.5 million passwords ended up on Russian hacking site read more »

The top five stupid hacker tricks

Hackers make mistakes just as often as anyone else read more »

Five ways Apple could improve the iPhone Siri voice assistant

Top feature requests for the next iPhone iteration read more »

Five new social engineering hacker tricks

Social media and identity fraud go hand in hand read more »

more in depth ..
Sophos Slideshows

The sorriest tech companies of 2012

No, really, they're sorry! Vendors apologise in 2012 for everything from Apple Maps to Cisco Connect Cloud to outage after outage and breach after breach read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open