We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Symantec

Symantec News

International law enforcement operation disrupts Shylock banking malware

Police in eight countries worked with security vendors to seize domain names and servers used by the Trojan program read more »

Attack on Dailymotion redirected visitors to exploits

A rogue iframe injected into the site led visitors to exploits that installed a click-fraud Trojan program, researchers from Symantec said read more »

Energy providers hacked through malicious software updates

Symantec says the Dragonfly campaign, originating in Eastern Europe, sought to gain persistent access to energy suppliers read more »

Massive botnet takedown stops spread of Cryptolocker ransomware

Hackers made millions from sophisticated extortion racket read more »

Hackers distribute banking malware through Buffalo site in Japan

Attackers managed to replace 10 legitimate files on the hardware manufacturer's site with malware-ridden versions read more »

Massive Flash exploit campaign directed at Japan seeks financial data

Legitimate websites in Japan have been compromised to serve up malicious code, Symantec said read more »

more news ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Symantec In Depth

Western Union: Big data driving digital transformation

CIO David Thompson and CTO Sanjay Saraf talk to ComputerworldUK about Hadoop strategy read more »

How MDM works -- or doesn't work -- for SMEs

Implementing mobile device management is a given in large organisations but smaller firms struggle read more »

When in China, don't leave your laptop alone, or spyware will be installed

If you travel to China or Russia, assume government or industry spooks will steal your data and install spyware. Here's how to thwart them read more »

Internet Explorer zero-day attacks - What you need to know

Expect an out-of-band patch as Microsoft deals with an actively exploited zero-day vulnerability read more »

Kaspersky researcher cracks Flame malware server password

Symantec said it tried to break the hash with brute force attacks but failed read more »

How to secure sensitive files and documents

IT pros must develop an approach to securing documents that gives the business the control it needs without stymying employees' productivity read more »

more in depth ..
Symantec Slideshows

15 Non-Certified IT Skills Growing in Demand

Follow the money read more »

Top two-factor authentication tools

Quick steps to improved ID and security management read more »

RSA 2013: Six security startups

These companies are tackling today's biggest security issues, from cloud security to authentication to mobile device management - See more at: http://www.infoworld.com/slideshows#sthash.woGoAN8P.dpuf read more »

gTLD applications - Tech giants lead grab for new domains

Google and Amazon spend millions to bet on names like BUY, GAME and SHOP read more »

more slideshows ..
White Papers

Putting IT back in control of BYOD

The benefits of BYOD read more »

4 ways IT can control contact centre costs

Lower the time your IT group spends managing contact centre technology read more »

more white papers ..

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open