We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

SSL

SSL News

Tip of the Hat: Heartbleed prompts chastened tech giants to fund OpenSSL

Ars Technica explains how a potential disaster finally convinced top tech firms to fund development of open source software they have been using for years. read more »

Heartbleed prompts joint vendor effort to boost OpenSSL, security

Cisco, Dell, Facebook, IBM, Intel, Google and Microsoft are among those backing the initiative via the Linux Foundation read more »

Coding error protects some Android apps from Heartbleed

A few office-productivity apps are protected from Heartbleed thanks to a mistake read more »

While Heartbleed distracts, hackers hit US universities

As many as 250,000 people could be affected by a wave of attacks not using Heartbleed read more »

Apple patches Secure Transport, but not because of Heartbleed

'Triple-handshake attack' threat quashed in update for OS X Mavericks and Mountain Lion, and iOS 7 read more »

Mysterious malware steals Apple credentials from jailbroken iOS devices

Some iOS users found a malicious library of unknown origin on their jailbroken devices read more »

more news ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
SSL In Depth

How to defend against the OpenSSL Heartbleed flaw

Basic steps for IT CIOs, CISOs and IT Directors to take now read more »

When in China, don't leave your laptop alone, or spyware will be installed

If you travel to China or Russia, assume government or industry spooks will steal your data and install spyware. Here's how to thwart them read more »

10 reasons to choose Ubuntu 12.10 over Windows 8

Canonical has touted its new OS as a good way to 'avoid the pain of Windows 8' - Here's why you should take up the challenge read more »

How to secure Big Data in Hadoop

You must make security a key part of your big data project right from the beginning read more »

Blackhat SEOs and managing the Google threat

Many users have 'a relationship of convenience' with Google, but security must be aware of how services identify, track and profile users read more »

Remember: BYOD is a user-driven movement, not a secure mobile device strategy

Addressing BYOD by itself makes little to no sense as BYOD is not really a business objective, but rather a movement read more »

more in depth ..
SSL Slideshows

10 PC applications to increase business productivity

We've drawn up a list of indispensable PC apps to help you work smarter read more »

13 IT security myths

Security experts hammer on security ideas they say are just myths read more »

10 security industry All-Stars

From Bruce Schneier to Moxie Marlinspike, these folks are the ones to isten to for security insight read more »

Fave raves: IT pros name their favourite products

IT products keep people productive and enterprise assets safe. read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open