Spyware

Spyware News

Reconnaissance code on industrial software site points to watering hole attack

Attackers are using a sophisticated Web-based tool to gather information on potential targets, researchers from AlienVault said read more »

Hackers prey on Russian patriotism to grow the Kelihos botnet

A recent spam campaign encouraged Russian speakers to install malware on their computers to participate in DDoS attacks, researchers said read more »

Attack targets firms from the automobile industry in Europe

Attackers are sending emails containing a new information-stealing Trojan program to customer service departments, Symantec researchers said read more »

Microsoft whacks Apple with new Surface Pro 3 ads

But omits pricing in its compare-and-contrast spots because the Surface costs more than a MacBook Air read more »

Is your Dropcam live feed being watched by someone else?

Two researchers will show at Defcon how a Dropcam could turn into a Trojan horse read more »

Hacker group targets video game companies to steal source code

The group has ties to the Chinese hacker underground and uses custom tools to attack companies, researchers from Dell SecureWorks said read more »

more news ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Spyware In Depth

When in China, don't leave your laptop alone, or spyware will be installed

If you travel to China or Russia, assume government or industry spooks will steal your data and install spyware. Here's how to thwart them read more »

Mobile security threats - Companies slow to react

Juniper study finds nearly a third of IT managers have reported a security threat as a result of personal devices accessing company data read more »

Mobile device management - Tools and technologies for the BYOD era

Vendors have created a whole range of MDM tools and technologies to help IT professionals to stay on top in the Bring Your Own Device environment read more »

How to build multiple layers of security for your small business

How secure are you? Check out our checklist featuring common aspects of computer security read more »

How to defend your company against online financial fraud threats

Cybercriminals are becoming more sneaky, but it's possible to deflect attacks with these best practices read more »

Symantec should not go back on Android malware claim

Symantec has backed off its earlier claims that apps in the Android Market were malware, but still says the apps are adware or spyware read more »

more in depth ..
Spyware Slideshows
more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open