The indictment of the Pakistani man is the first focused on an alleged mobile spyware app, the DOJ says read more »
A new version of the Dyreza online banking Trojan is stealing Salesforce.com log-in credentials read more »
The new malware program is an OS X version of a Windows backdoor called XSLCmd, researchers from FireEye said read more »
New attacks with the Angler exploit kit inject code directly in browser processes without leaving files on disk, a researcher found read more »
Attackers are using a sophisticated Web-based tool to gather information on potential targets, researchers from AlienVault said read more »
A recent spam campaign encouraged Russian speakers to install malware on their computers to participate in DDoS attacks, researchers said read more »more news ..
Every organisation experiences user frustrations and complications that result in support calls to the help desk. While each call may seem to suggest a unique problem, have you ever stopped to ask whether there could be a common root cause? read more »more blogs ..
Watch this on demand webinar which explores IT innovation, managed print services and business agility.
Check out our latest articles on Microsoft's next-generation operating system.
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.
Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.
Spyware In Depth
Rogue cell towers discovered in Washington, D.C. read more »
If you travel to China or Russia, assume government or industry spooks will steal your data and install spyware. Here's how to thwart them read more »
Juniper study finds nearly a third of IT managers have reported a security threat as a result of personal devices accessing company data read more »
Vendors have created a whole range of MDM tools and technologies to help IT professionals to stay on top in the Bring Your Own Device environment read more »
How secure are you? Check out our checklist featuring common aspects of computer security read more »
Cybercriminals are becoming more sneaky, but it's possible to deflect attacks with these best practices read more »more in depth ..