Symantec

Symantec News

Cisco buying Neohapsis for security brainpower

The small Chicago firm will add to Cisco's security services expertise read more »

NSA spy program targets mobile networks worldwide

Documents leaked by Edward Snowden show evidence of previously undisclosed operations read more »

Regin malware linked to attacks on Belgacom, well-known cryptographer

Regin's targets have lead to suspicions that the U.S. and U.K. may have created it read more »

Ministry of Defence warms to BYOD to gain digital flexibility

Troops will be able to access documents through a secure web browser on their own devices read more »

Traces of Regin malware may date back to 2006

Regin was known about for some time by the security industry, according to Symantec read more »

Symantec identifies sophisticated, stealthy 'Regin' malware

The back-door-type Trojan was likely developed by a nation state, researcher say read more »

more news ..
Symantec Blogs

Enterprises unprepared for software license compliance risk from virtualisation

Be proactive or risk hefty bills come audit time read more »

Target breach: Vendors, you are not wrestlers

This isn't the WWE... read more »

Symantec Challenges Financial Services Security

Symantec turns its staff into cyberwarriors read more »

Hurry up Symantec

Musings from Symantec's 2013 Analyst Event read more »

more blogs ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Symantec In Depth

The hacker 'skills gap' may be more of a strategy gap

It feels like the bad guys are winning read more »

Western Union: Big data driving digital transformation

CIO David Thompson and CTO Sanjay Saraf talk to ComputerworldUK about Hadoop strategy read more »

How MDM works -- or doesn't work -- for SMEs

Implementing mobile device management is a given in large organisations but smaller firms struggle read more »

When in China, don't leave your laptop alone, or spyware will be installed

If you travel to China or Russia, assume government or industry spooks will steal your data and install spyware. Here's how to thwart them read more »

Internet Explorer zero-day attacks - What you need to know

Expect an out-of-band patch as Microsoft deals with an actively exploited zero-day vulnerability read more »

Kaspersky researcher cracks Flame malware server password

Symantec said it tried to break the hash with brute force attacks but failed read more »

more in depth ..
Symantec Slideshows

The 10 most terrifying security nightmares revealed at the Black Hat and Def Con hacker conferences

Hacked planes. Unstoppable, utterly malicious flash drives. Hotel automation gone crazy. These are the 10 most terrifying security stories out of the premier hacker and security conferences in Las Vegas. read more »

15 Non-Certified IT Skills Growing in Demand

Follow the money read more »

Top two-factor authentication tools

Quick steps to improved ID and security management read more »

RSA 2013: Six security startups

These companies are tackling today's biggest security issues, from cloud security to authentication to mobile device management - See more at: http://www.infoworld.com/slideshows#sthash.woGoAN8P.dpuf read more »

more slideshows ..
White Papers

Putting IT back in control of BYOD

The benefits of BYOD read more »

4 ways IT can control contact centre costs

Lower the time your IT group spends managing contact centre technology read more »

more white papers ..

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open