User authentication News
A weakness in Apple's Wi-Fi implementation could give hackers access to enterprise wireless networks, researchers said read more »
Where you are and what you're doing in your car could suddenly become very public. read more »
iOS 8 isn't as much of a paradigm shift for users as some earlier releases, but that doesn't mean IT departments can easily it write off. read more »
The default browser in older, widely used versions of Android contains a vulnerability that can be used to bypass the same-origin policy read more »
Five million hacked passwords dumped on Russian cybercrime forums read more »
A new version of the Dyreza online banking Trojan is stealing Salesforce.com log-in credentials read more »more news ..
User authentication Blogs
APIs, supply chain, profit and survival read more »
If the attack happened in February or March, itâ€™s long past the point where a reset will stop possible secondary compromises read more »
But ignoring the usability vulnerabilities read more »
Necessity is the mother of invention in the public sector read more »more blogs ..
Watch this on demand webinar which explores IT innovation, managed print services and business agility.
Check out our latest articles on Microsoft's next-generation operating system.
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.
Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.
User authentication In Depth
Are some APIs too precious to give away? Swisscom strikes a balance with big data read more »
The risks are no greater than transactions involving payment cards read more »
Here are four tips for preventing social engineering and DDoS hacks from ruining your business. read more »
Learning from the SaaS pioneer read more »
Cripple the automated processes presented by malware platforms and the threats aren't quite so serious read more »
Market not worth spit much less the time and money unless someone transforms the category, argues analyst read more »more in depth ..
User authentication Slideshows
From analysing the way you walk to your heartbeat, these password killers could be here soon. read more »
Hacked planes. Unstoppable, utterly malicious flash drives. Hotel automation gone crazy. These are the 10 most terrifying security stories out of the premier hacker and security conferences in Las Vegas. read more »
Make sure no-one gets a good catch at an employee's expense - consumer security provider BullGuard has put together a few tips on Phishing prevention read more »
Android mobile devices, while not typically thought of as places where development work gets done, can offer surprisingly useful apps to help developers get the job done, anywhere. read more »more slideshows ..