Complaints continue to pour in from users whose Wi-Fi is malfunctioning after upgrading to the new Mac OS X version read more »
Soltani has assisted newspapers with investigations of government surveillance and online privacy read more »
However, there is the possibility that they will be watered down by the time European countries implement them read more »
Five million hacked passwords dumped on Russian cybercrime forums read more »
Many questions remain after a security company said it had uncovered a huge database of stolen online credentials read more »
Antivirus products increase a computer's attack surface and may even lower operating system protections, a security researcher claims read more »more news ..
"Dual-use" technology: who is meant to be the bad guy? read more »more blogs ..
Watch this on demand webinar which explores IT innovation, managed print services and business agility.
Check out our latest articles on Microsoft's next-generation operating system.
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.
Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.
Sophos In Depth
What if an app uploads a sales representatives' contact list and the developer then sells it to a competitor? read more »
Security researchers proposed several methods to protect computers from being compromised via a new Java vulnerability read more »
Social networking company has little new to say about how 6.5 million passwords ended up on Russian hacking site read more »
Hackers make mistakes just as often as anyone else read more »
Top feature requests for the next iPhone iteration read more »
Social media and identity fraud go hand in hand read more »more in depth ..
Microsoft takes us around a Kelly Hoppen designed apartment to show us its collaborative business products read more »
No, really, they're sorry! Vendors apologise in 2012 for everything from Apple Maps to Cisco Connect Cloud to outage after outage and breach after breach read more »more slideshows ..