Hackers gained access on Google's servers to a database that contained information on U.S. surveillance targets read more »
Sussex Health Informatics Service monitoring 40,000 devices read more »
Owners of URL that Microsoft cites as example deny they're hosting malware, accuse Bing of 'inaccurate analysis' read more »
The cloud content sharing company has brought in Justin Somaini read more »
Cronto develops PIN reader alternative with German bank for defence against man-in-the-browser attack read more »
Criminals follow line of least resistance with manufacturing most targetted read more »more news ..
Symantec Blogsmore blogs ..
On demand Biztech Briefing-Learn how to effectively deliver mobile work styles and cloud services together.
Check out our latest articles on Microsoft's next-generation operating system.
View the latest capacity management resources including whitepapers, videos and news.
Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.
Symantec In Depth
If you travel to China or Russia, assume government or industry spooks will steal your data and install spyware. Here's how to thwart them read more »
Expect an out-of-band patch as Microsoft deals with an actively exploited zero-day vulnerability read more »
Symantec said it tried to break the hash with brute force attacks but failed read more »
IT pros must develop an approach to securing documents that gives the business the control it needs without stymying employees' productivity read more »
How to ensure sensitive data never leaves your customer relationship management app without preventing salespeople from playing Angry Birds on their own devices during their own time read more »
Has the US started a cyberwar by admitting that Flame is part of a cyberweapons programme? read more »more in depth ..
These companies are tackling today's biggest security issues, from cloud security to authentication to mobile device management - See more at: http://www.infoworld.com/slideshows#sthash.woGoAN8P.dpuf read more »
Google and Amazon spend millions to bet on names like BUY, GAME and SHOP read more »
Managing devices in a BYOD environment is no mean feat, and the right mobile device management (MDM) product can be a key component in making it work. Here are 10 leading MDM products on the market today read more »
Check out these browser-based tools to keep up on the latest cybersecurity threats read more »more slideshows ..