We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Symantec

Symantec News

'Francophoned' cybertheft operation reportedly back in action

Attackers steal funds from French organizations using spear phishing, information-snatching malware and rogue phone calls read more »

In Heartbleed's wake, Comodo cranks out fresh SSL certificates

Comodo's chief technology officer warns it is still very early in the remediation process read more »

Website operators will have a hard time dealing with the Heartbleed vulnerability

Patching the vulnerable OpenSSL software is just the first step, security experts say read more »

World hit by record wave of 'mega' data breaches in 2013, says Symantec

Over half a billion records compromised read more »

Stung by file-encrypting malware, researchers fight back

Ransomware programs such as CryptoDefense, CryptorBit and HowDecrypt have left users enraged -- and often helpless read more »

Cybercriminals use sophisticated PowerShell-based malware

Two separate threats that use malicious Windows PowerShell scripts were identified in the past few weeks by malware researchers read more »

more news ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Symantec In Depth

How MDM works -- or doesn't work -- for SMEs

Implementing mobile device management is a given in large organisations but smaller firms struggle read more »

When in China, don't leave your laptop alone, or spyware will be installed

If you travel to China or Russia, assume government or industry spooks will steal your data and install spyware. Here's how to thwart them read more »

Internet Explorer zero-day attacks - What you need to know

Expect an out-of-band patch as Microsoft deals with an actively exploited zero-day vulnerability read more »

Kaspersky researcher cracks Flame malware server password

Symantec said it tried to break the hash with brute force attacks but failed read more »

How to secure sensitive files and documents

IT pros must develop an approach to securing documents that gives the business the control it needs without stymying employees' productivity read more »

BYOD best practices - Secure data and not devices

How to ensure sensitive data never leaves your customer relationship management app without preventing salespeople from playing Angry Birds on their own devices during their own time read more »

more in depth ..
Symantec Slideshows

15 Non-Certified IT Skills Growing in Demand

Follow the money read more »

Top two-factor authentication tools

Quick steps to improved ID and security management read more »

RSA 2013: Six security startups

These companies are tackling today's biggest security issues, from cloud security to authentication to mobile device management - See more at: http://www.infoworld.com/slideshows#sthash.woGoAN8P.dpuf read more »

gTLD applications - Tech giants lead grab for new domains

Google and Amazon spend millions to bet on names like BUY, GAME and SHOP read more »

more slideshows ..
White Papers

Putting IT back in control of BYOD

The benefits of BYOD read more »

4 ways IT can control contact centre costs

Lower the time your IT group spends managing contact centre technology read more »

more white papers ..

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open