User authentication News
RHEL 7.0 embraces containers and NUMA-aware virtualisation, and offers a unified command line interface read more »
The certificates were used to inspect encrypted traffic on a private network, Google said read more »
Goldenshores lied to users about its flashlight app's data sharing habits, FTC says read more »
Some users are advised to change their passwords read more »
Attackers could start to aggressively distribute this malware in the near future, Kaspersky Lab researchers warn read more »
Hackers exploit exposed JBoss management interfaces and invokers to install Web shells on servers read more »more news ..
User authentication Blogsmore blogs ..
Watch this on demand webinar which explores IT innovation, managed print services and business agility.
Check out our latest articles on Microsoft's next-generation operating system.
Explore how you can improve your servers, storage and networks by developing your infrastructure.
Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.
User authentication In Depth
Open-source software throws a wrench into traditional software evaluation criteria. Here's what to look for and what you'll be expected to contribute. read more »
As billions of chip-enabled devices connect to the internet, many businesses are making strides towards supporting the IoT read more »
If you travel to China or Russia, assume government or industry spooks will steal your data and install spyware. Here's how to thwart them read more »
Computing power is increasingly being distributed to all types of intelligent devices – 'things' - that not long ago would have been used in a completely ‘dumb’ state read more »
Canonical has touted its new OS as a good way to 'avoid the pain of Windows 8' - Here's why you should take up the challenge read more »more in depth ..
User authentication Slideshows
Quick steps to improved ID and security management read more »
These companies are tackling today's biggest security issues, from cloud security to authentication to mobile device management - See more at: http://www.infoworld.com/slideshows#sthash.woGoAN8P.dpuf read more »
If the world of Linux distributions has ever had a rising star, it's Mageia. Read on for a brief tour of Mageia's interface and features read more »
Add-ins abound for the increasingly popular and powerful browser read more »more slideshows ..