Regin's targets have lead to suspicions that the U.S. and U.K. may have created it read more »
Troops will be able to access documents through a secure web browser on their own devices read more »
Regin was known about for some time by the security industry, according to Symantec read more »
The back-door-type Trojan was likely developed by a nation state, researcher say read more »
To reach the uranium enrichment plant at Natanz, Stuxnet's creators likely targeted Iranian companies tied to it, researchers said read more »
IBM's new Dynamic Cloud Security offers a set of services covering access control, data protection and increased visibility read more »more news ..
Be proactive or risk hefty bills come audit time read more »
This isn't the WWE... read more »
Symantec turns its staff into cyberwarriors read more »
Musings from Symantec's 2013 Analyst Event read more »more blogs ..
Watch this on demand webinar which explores IT innovation, managed print services and business agility.
Check out our latest articles on Microsoft's next-generation operating system.
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.
Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.
Symantec In Depth
It feels like the bad guys are winning read more »
CIO David Thompson and CTO Sanjay Saraf talk to ComputerworldUK about Hadoop strategy read more »
Implementing mobile device management is a given in large organisations but smaller firms struggle read more »
If you travel to China or Russia, assume government or industry spooks will steal your data and install spyware. Here's how to thwart them read more »
Expect an out-of-band patch as Microsoft deals with an actively exploited zero-day vulnerability read more »
Symantec said it tried to break the hash with brute force attacks but failed read more »more in depth ..
Hacked planes. Unstoppable, utterly malicious flash drives. Hotel automation gone crazy. These are the 10 most terrifying security stories out of the premier hacker and security conferences in Las Vegas. read more »
Follow the money read more »
Quick steps to improved ID and security management read more »
These companies are tackling today's biggest security issues, from cloud security to authentication to mobile device management - See more at: http://www.infoworld.com/slideshows#sthash.woGoAN8P.dpuf read more »more slideshows ..