Spyware

Spyware News

Citadel malware now targets password management applications

A new Citadel configuration steals the master keys for two password managers and a secure authentication program read more »

Activists release Detekt tool that finds surveillance malware

The tool is a joint project of multiple privacy groups who investigated malware used to target journalists and human rights activists read more »

Apple strikes deal with China's UnionPay for App Store payments

Apple today announced it had struck a deal with UnionPay, China's most popular credit and debit card system, to accept payments. read more »

Malware served through rogue Tor exit node tied to cyberespionage group

There is strong evidence that it was used to target European government agencies, researchers from F-Secure said read more »

First Stuxnet victims were five Iranian industrial automation companies

To reach the uranium enrichment plant at Natanz, Stuxnet's creators likely targeted Iranian companies tied to it, researchers said read more »

Cyberespionage group targets traveling execs through hotel networks

The group infects the network access Web portals used by hotels and business centers to target specific guests read more »

more news ..
Spyware Blogs

More Reasons Never to Trust Microsoft - or US Equipment

read more »

Resisting Surveillance on a Unprecedented Scale III

read more »

Can You Trust Microsoft With Your Company Secrets?

read more »

Admin rights - Your Achilles Heel

Every organisation experiences user frustrations and complications that result in support calls to the help desk. While each call may seem to suggest a unique problem, have you ever stopped to ask whether there could be a common root cause? read more »

more blogs ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Spyware In Depth

Mobile phone spy masts worry US Congress

Rogue cell towers discovered in Washington, D.C. read more »

When in China, don't leave your laptop alone, or spyware will be installed

If you travel to China or Russia, assume government or industry spooks will steal your data and install spyware. Here's how to thwart them read more »

Mobile security threats - Companies slow to react

Juniper study finds nearly a third of IT managers have reported a security threat as a result of personal devices accessing company data read more »

Mobile device management - Tools and technologies for the BYOD era

Vendors have created a whole range of MDM tools and technologies to help IT professionals to stay on top in the Bring Your Own Device environment read more »

How to build multiple layers of security for your small business

How secure are you? Check out our checklist featuring common aspects of computer security read more »

How to defend your company against online financial fraud threats

Cybercriminals are becoming more sneaky, but it's possible to deflect attacks with these best practices read more »

more in depth ..
Spyware Slideshows
more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open