User authentication News
The attackers are likely using a large list of credentials compiled by a Russian gang, Namecheap said read more »
Supplier to plug the gap until the cross-government Identity Assurance programme is up and running read more »
Users will be able to revoke permissions previously granted to apps starting with Firefox OS 2.1 read more »
Heise Online reveals top-secret details about the GCHQ's 'Hacienda' program read more »
Daisy Updata Communications wins deal to provide WAN services to public sector bodies across Kent read more »
Clarizen v6 combines project management tools with enterprise social collaboration software in a single cloud suite read more »more news ..
User authentication Blogsmore blogs ..
Watch this on demand webinar which explores IT innovation, managed print services and business agility.
Check out our latest articles on Microsoft's next-generation operating system.
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.
Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.
User authentication In Depth
Here are four tips for preventing social engineering and DDoS hacks from ruining your business. read more »
Learning from the SaaS pioneer read more »
Cripple the automated processes presented by malware platforms and the threats aren't quite so serious read more »
Market not worth spit much less the time and money unless someone transforms the category, argues analyst read more »
Accenture's mobile expert gives businesses advice on how to prepare for the new Apple operating system read more »
Insecure by design and trusted by default, embedded systems present security concerns that could prove crippling read more »more in depth ..
User authentication Slideshows
From analysing the way you walk to your heartbeat, these password killers could be here soon. read more »
Hacked planes. Unstoppable, utterly malicious flash drives. Hotel automation gone crazy. These are the 10 most terrifying security stories out of the premier hacker and security conferences in Las Vegas. read more »
Make sure no-one gets a good catch at an employee's expense - consumer security provider BullGuard has put together a few tips on Phishing prevention read more »
Android mobile devices, while not typically thought of as places where development work gets done, can offer surprisingly useful apps to help developers get the job done, anywhere. read more »more slideshows ..