The operation seized command-and-control servers and Internet domains used by the Ramnit gang read more »
A security firm says code used against Sony has similarities to other malware linked to North Korea read more »
Website owners still using 1024-bit SSL certificates should replace them with 2048-bit ones read more »
Security researchers found a strong connection between Regin and a keylogger used by the Five Eyes intelligence alliance read more »
The emails contain an HTML attachment that seems to be slipping past spam filters read more »
The small Chicago firm will add to Cisco's security services expertise read more »more news ..
Be proactive or risk hefty bills come audit time read more »
This isn't the WWE... read more »
Symantec turns its staff into cyberwarriors read more »
Musings from Symantec's 2013 Analyst Event read more »more blogs ..
Watch this on demand webinar which explores IT innovation, managed print services and business agility.
Check out our latest articles on Microsoft's next-generation operating system.
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.
Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.
Symantec In Depth
It feels like the bad guys are winning read more »
CIO David Thompson and CTO Sanjay Saraf talk to ComputerworldUK about Hadoop strategy read more »
Implementing mobile device management is a given in large organisations but smaller firms struggle read more »
If you travel to China or Russia, assume government or industry spooks will steal your data and install spyware. Here's how to thwart them read more »
Expect an out-of-band patch as Microsoft deals with an actively exploited zero-day vulnerability read more »
Symantec said it tried to break the hash with brute force attacks but failed read more »more in depth ..
Hacked planes. Unstoppable, utterly malicious flash drives. Hotel automation gone crazy. These are the 10 most terrifying security stories out of the premier hacker and security conferences in Las Vegas. read more »
Follow the money read more »
Quick steps to improved ID and security management read more »
These companies are tackling today's biggest security issues, from cloud security to authentication to mobile device management - See more at: http://www.infoworld.com/slideshows#sthash.woGoAN8P.dpuf read more »more slideshows ..