User authentication News
Twitter is moving into mobile app services with Fabric, a new tool for developers that ties popular services together into one extension. read more »
The new OS will feature enhancements in areas like identity protection, data security and malware resistance read more »
The AWS Directory Service costs from $36.50 per month read more »
China has allegedly staged the attack, according to an anti-censorship group. read more »
Google Chrome gets support for new authentication protocol called Universal 2nd Factor read more »
Gives IT full visibility of changes read more »more news ..
User authentication Blogs
APIs, supply chain, profit and survival read more »
If the attack happened in February or March, itâ€™s long past the point where a reset will stop possible secondary compromises read more »
But ignoring the usability vulnerabilities read more »
Necessity is the mother of invention in the public sector read more »more blogs ..
Watch this on demand webinar which explores IT innovation, managed print services and business agility.
Check out our latest articles on Microsoft's next-generation operating system.
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.
Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.
User authentication In Depth
The early look at Windows Server 10 reveals many expected enhancements and nice surprises read more »
No major changes compared to Windows Server 2012 R2, but some very good incremental ones.With this just a very early version, here are some changes you might want to consider as you decide when to start looking at the release. read more »
Microsoft offers compelling benefits for moving to its hosted offering but getting there requires preparation read more »
Are some APIs too precious to give away? Swisscom strikes a balance with big data read more »
The risks are no greater than transactions involving payment cards read more »
Here are four tips for preventing social engineering and DDoS hacks from ruining your business. read more »more in depth ..
User authentication Slideshows
From analysing the way you walk to your heartbeat, these password killers could be here soon. read more »
Hacked planes. Unstoppable, utterly malicious flash drives. Hotel automation gone crazy. These are the 10 most terrifying security stories out of the premier hacker and security conferences in Las Vegas. read more »
Make sure no-one gets a good catch at an employee's expense - consumer security provider BullGuard has put together a few tips on Phishing prevention read more »
Android mobile devices, while not typically thought of as places where development work gets done, can offer surprisingly useful apps to help developers get the job done, anywhere. read more »more slideshows ..