We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

User authentication

User authentication News

Satellite communication systems rife with security flaws, vulnerable to remote hacks

Researchers found critical vulnerabilities in satellite communications devices used in the defense, maritime, aerospace and other sectors read more »

Facebook users targeted by iBanking Android trojan app

A computer Trojan injects messages into Facebook to trick users into installing Android malware, researchers from ESET said read more »

Update: German researchers hack Galaxy S5 fingerprint login

The integration with Paypal makes the weakness of Samsung's implementation extra serious read more »

Lavaboom builds encrypted webmail service to resist snooping

The service has started accepting registrations for its upcoming beta testing period read more »

Box patches Heartbleed flaw in its cloud storage systems

The company is also telling customers to change their passwords read more »

With a Wi-Fi cloud service, Ruckus aims to help hotspot owners make money

The company will host customers' public hotspot management and give them a dashboard to control access read more »

more news ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
User authentication In Depth

How to defend against the OpenSSL Heartbleed flaw

Basic steps for IT CIOs, CISOs and IT Directors to take now read more »

Security should no longer be 'cementing' the status quo

If your security programme is struggling, don't stick with it because it's the way things have always been done read more »

IT's new concern: The personal cloud

read more »

Sizing up open source: Not so simple

Open-source software throws a wrench into traditional software evaluation criteria. Here's what to look for and what you'll be expected to contribute. read more »

The impact of the 'Internet of Things' on corporate IT

As billions of chip-enabled devices connect to the internet, many businesses are making strides towards supporting the IoT read more »

When in China, don't leave your laptop alone, or spyware will be installed

If you travel to China or Russia, assume government or industry spooks will steal your data and install spyware. Here's how to thwart them read more »

more in depth ..
User authentication Slideshows

Top two-factor authentication tools

Quick steps to improved ID and security management read more »

RSA 2013: Six security startups

These companies are tackling today's biggest security issues, from cloud security to authentication to mobile device management - See more at: http://www.infoworld.com/slideshows#sthash.woGoAN8P.dpuf read more »

Mageia - A rising Linux star

If the world of Linux distributions has ever had a rising star, it's Mageia. Read on for a brief tour of Mageia's interface and features read more »

Chrome extensions for power users

Add-ins abound for the increasingly popular and powerful browser read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open