Attackers steal funds from French organizations using spear phishing, information-snatching malware and rogue phone calls read more »
Comodo's chief technology officer warns it is still very early in the remediation process read more »
Patching the vulnerable OpenSSL software is just the first step, security experts say read more »
Over half a billion records compromised read more »
Ransomware programs such as CryptoDefense, CryptorBit and HowDecrypt have left users enraged -- and often helpless read more »
Two separate threats that use malicious Windows PowerShell scripts were identified in the past few weeks by malware researchers read more »more news ..
Symantec Blogsmore blogs ..
Watch this on demand webinar which explores IT innovation, managed print services and business agility.
Check out our latest articles on Microsoft's next-generation operating system.
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.
Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.
Symantec In Depth
Implementing mobile device management is a given in large organisations but smaller firms struggle read more »
If you travel to China or Russia, assume government or industry spooks will steal your data and install spyware. Here's how to thwart them read more »
Expect an out-of-band patch as Microsoft deals with an actively exploited zero-day vulnerability read more »
Symantec said it tried to break the hash with brute force attacks but failed read more »
IT pros must develop an approach to securing documents that gives the business the control it needs without stymying employees' productivity read more »
How to ensure sensitive data never leaves your customer relationship management app without preventing salespeople from playing Angry Birds on their own devices during their own time read more »more in depth ..
Follow the money read more »
Quick steps to improved ID and security management read more »
These companies are tackling today's biggest security issues, from cloud security to authentication to mobile device management - See more at: http://www.infoworld.com/slideshows#sthash.woGoAN8P.dpuf read more »
Google and Amazon spend millions to bet on names like BUY, GAME and SHOP read more »more slideshows ..