Symantec

Symantec News

Dropbox used for convincing phishing attack

Dropbox was quick to remove the bogus login page, Symantec said read more »

FBI warns of cyberattacks linked to China

The FBI and security companies have observed 'recent intrusions' read more »

Security vendors claim progress against Chinese group that hacked Google

A collaborative effort has resulted in better defenses against the "Operation Aurora" hackers read more »

'Hurricane Panda' hackers used Microsoft zero-day, CrowdStrike says

The group, which targets technology infrastructure companies, is believed to be linked to China's government read more »

Researcher builds system to protect against malicious insiders

When an employee turns on his own company, the results -- damaged networks, data theft and even work stoppage -- could be devastating. Virginia Tech's Daphne Yao hopes the algorithms she's working on can stop that kind of attack. read more »

Symantec's board votes to split the company in two

One company will focus on security and the other on information management read more »

more news ..
Symantec Blogs

Enterprises unprepared for software license compliance risk from virtualisation

Be proactive or risk hefty bills come audit time read more »

Target breach: Vendors, you are not wrestlers

This isn't the WWE... read more »

Symantec Challenges Financial Services Security

Symantec turns its staff into cyberwarriors read more »

Hurry up Symantec

Musings from Symantec's 2013 Analyst Event read more »

more blogs ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Symantec In Depth

The hacker 'skills gap' may be more of a strategy gap

It feels like the bad guys are winning read more »

Western Union: Big data driving digital transformation

CIO David Thompson and CTO Sanjay Saraf talk to ComputerworldUK about Hadoop strategy read more »

How MDM works -- or doesn't work -- for SMEs

Implementing mobile device management is a given in large organisations but smaller firms struggle read more »

When in China, don't leave your laptop alone, or spyware will be installed

If you travel to China or Russia, assume government or industry spooks will steal your data and install spyware. Here's how to thwart them read more »

Internet Explorer zero-day attacks - What you need to know

Expect an out-of-band patch as Microsoft deals with an actively exploited zero-day vulnerability read more »

Kaspersky researcher cracks Flame malware server password

Symantec said it tried to break the hash with brute force attacks but failed read more »

more in depth ..
Symantec Slideshows

The 10 most terrifying security nightmares revealed at the Black Hat and Def Con hacker conferences

Hacked planes. Unstoppable, utterly malicious flash drives. Hotel automation gone crazy. These are the 10 most terrifying security stories out of the premier hacker and security conferences in Las Vegas. read more »

15 Non-Certified IT Skills Growing in Demand

Follow the money read more »

Top two-factor authentication tools

Quick steps to improved ID and security management read more »

RSA 2013: Six security startups

These companies are tackling today's biggest security issues, from cloud security to authentication to mobile device management - See more at: http://www.infoworld.com/slideshows#sthash.woGoAN8P.dpuf read more »

more slideshows ..
White Papers

Putting IT back in control of BYOD

The benefits of BYOD read more »

4 ways IT can control contact centre costs

Lower the time your IT group spends managing contact centre technology read more »

more white papers ..

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open