Will ship four updates for Windows XP in second-to-last round of patches for the aged OS read more »
The tool can be used to add malicious functionality to legitimate applications, researchers from Symantec said read more »
After users wonder if they'd fallen into Bizarro World, Microsoft clarifies security announcement from its China operation read more »
Box enables employees to collaborate on sensitive docs from anywhere through the cloud read more »
The exploit is being distributed from many compromised websites around the world, researchers from Symantec said read more »more news ..
Symantec Blogsmore blogs ..
Watch this on demand webinar which explores IT innovation, managed print services and business agility.
Check out our latest articles on Microsoft's next-generation operating system.
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.
Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.
Symantec In Depth
If you travel to China or Russia, assume government or industry spooks will steal your data and install spyware. Here's how to thwart them read more »
Expect an out-of-band patch as Microsoft deals with an actively exploited zero-day vulnerability read more »
Symantec said it tried to break the hash with brute force attacks but failed read more »
IT pros must develop an approach to securing documents that gives the business the control it needs without stymying employees' productivity read more »
How to ensure sensitive data never leaves your customer relationship management app without preventing salespeople from playing Angry Birds on their own devices during their own time read more »
Has the US started a cyberwar by admitting that Flame is part of a cyberweapons programme? read more »more in depth ..
Follow the money read more »
Quick steps to improved ID and security management read more »
These companies are tackling today's biggest security issues, from cloud security to authentication to mobile device management - See more at: http://www.infoworld.com/slideshows#sthash.woGoAN8P.dpuf read more »
Google and Amazon spend millions to bet on names like BUY, GAME and SHOP read more »more slideshows ..