User authentication

User authentication News

Sencha melds desktop and smartphone management with Space

The upgraded platform gets desktop client to go along with smartphone and tablet versions read more »

Drupal: If you weren't quick to patch, assume your site was hacked

Drupal site owners who failed to rapidly deploy a recent critical patch were advised to restore their sites from backups read more »

Apple Pay rival MCX defends security after hackers steal emails

read more »

Microsoft opens Office 365 to programmers

At TechEd Europe, Microsoft announced updates to Office 365, Azure and Intune read more »

Senator wants Whisper to explain how it tracks users, shares their data

Reports saying the supposedly anonymous social media app is sharing user information leads to questions from Rockefeller read more »

Facebook and Yahoo prevent use of recycled email addresses to hijack accounts

A new mechanism helps email servers determine if a message was intended for a recycled account's previous owner read more »

more news ..
User authentication Blogs

New Projects from the Ever-Protean World of Open Source

More amazing ideas read more »

Hyper-connected consumers and the new digital divide

APIs, supply chain, profit and survival read more »

The eBay breach: Big brands can no longer protect their users

If the attack happened in February or March, it’s long past the point where a reset will stop possible secondary compromises read more »

You're mitigating the security vulnerabilities in authentication...

But ignoring the usability vulnerabilities read more »

more blogs ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
User authentication In Depth

The best new features in Windows Server 10 (so far)

The early look at Windows Server 10 reveals many expected enhancements and nice surprises read more »

Windows Server 10 Technical Preview: A first look

No major changes compared to Windows Server 2012 R2, but some very good incremental ones.With this just a very early version, here are some changes you might want to consider as you decide when to start looking at the release. read more »

Ten major Office 365 migration gotchas to avoid

Microsoft offers compelling benefits for moving to its hosted offering but getting there requires preparation read more »

Swisscom: Customer trust is something we should not compromise in any way

Are some APIs too precious to give away? Swisscom strikes a balance with big data read more »

Why giving mobile apps banking info isn't as risky as it seems

The risks are no greater than transactions involving payment cards read more »

Four small business security lessons from real-life hacks

Here are four tips for preventing social engineering and DDoS hacks from ruining your business. read more »

more in depth ..
User authentication Slideshows

7 futuristic authentication systems DARPA is funding

From analysing the way you walk to your heartbeat, these password killers could be here soon. read more »

The 10 most terrifying security nightmares revealed at the Black Hat and Def Con hacker conferences

Hacked planes. Unstoppable, utterly malicious flash drives. Hotel automation gone crazy. These are the 10 most terrifying security stories out of the premier hacker and security conferences in Las Vegas. read more »

Six tips to protect employees from phishing attacks

Make sure no-one gets a good catch at an employee's expense - consumer security provider BullGuard has put together a few tips on Phishing prevention read more »

11 Android tools for web developers

Android mobile devices, while not typically thought of as places where development work gets done, can offer surprisingly useful apps to help developers get the job done, anywhere. read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open