We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

User authentication

User authentication News

Coding error protects some Android apps from Heartbleed

A few office-productivity apps are protected from Heartbleed thanks to a mistake read more »

How to keep your smartphone (and its data) secure

These tips and tools can help you keep your smartphone close, and protect your data if it strays read more »

Mysterious malware steals Apple credentials from jailbroken iOS devices

Some iOS users found a malicious library of unknown origin on their jailbroken devices read more »

NEC launches face-recognition protection for PCs

NEC's face-recognition technology is being rolled out as an enterprise security solution read more »

Web apps and point-of-sale were leading hacker targets in 2013, says Verizon

The telco's annual data breach report incorporates data from more sources than ever before read more »

SEC seeks data on cyber security policies at Wall Street firms

Cyber defenses at more than 50 broker-dealers and investment advisers will be assessed by federal examiners read more »

more news ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
User authentication In Depth

How to defend against the OpenSSL Heartbleed flaw

Basic steps for IT CIOs, CISOs and IT Directors to take now read more »

Security should no longer be 'cementing' the status quo

If your security programme is struggling, don't stick with it because it's the way things have always been done read more »

IT's new concern: The personal cloud

read more »

Sizing up open source: Not so simple

Open-source software throws a wrench into traditional software evaluation criteria. Here's what to look for and what you'll be expected to contribute. read more »

The impact of the 'Internet of Things' on corporate IT

As billions of chip-enabled devices connect to the internet, many businesses are making strides towards supporting the IoT read more »

When in China, don't leave your laptop alone, or spyware will be installed

If you travel to China or Russia, assume government or industry spooks will steal your data and install spyware. Here's how to thwart them read more »

more in depth ..
User authentication Slideshows

Top two-factor authentication tools

Quick steps to improved ID and security management read more »

RSA 2013: Six security startups

These companies are tackling today's biggest security issues, from cloud security to authentication to mobile device management - See more at: http://www.infoworld.com/slideshows#sthash.woGoAN8P.dpuf read more »

Mageia - A rising Linux star

If the world of Linux distributions has ever had a rising star, it's Mageia. Read on for a brief tour of Mageia's interface and features read more »

Chrome extensions for power users

Add-ins abound for the increasingly popular and powerful browser read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open