User authentication

User authentication News

Namecheap says accounts compromised in hacking incident

The attackers are likely using a large list of credentials compiled by a Russian gang, Namecheap said read more »

MoJ seeks help with project to digitise courts

Supplier to plug the gap until the cross-government Identity Assurance programme is up and running read more »

Firefox OS to outdo Android on granular application permissions

Users will be able to revoke permissions previously granted to apps starting with Firefox OS 2.1 read more »

British spy agency scanned for vulnerable systems in 32 countries, German paper reveals

Heise Online reveals top-secret details about the GCHQ's 'Hacienda' program read more »

Kent County Council awards £24m PSN contract

Daisy Updata Communications wins deal to provide WAN services to public sector bodies across Kent read more »

Clarizen improves charts, UI in social project management product

Clarizen v6 combines project management tools with enterprise social collaboration software in a single cloud suite read more »

more news ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
User authentication In Depth

Four small business security lessons from real-life hacks

Here are four tips for preventing social engineering and DDoS hacks from ruining your business. read more »

What these 6 CEOs learned from working at Salesforce

Learning from the SaaS pioneer read more »

Kicking the stool out from under the cybercrime economy

Cripple the automated processes presented by malware platforms and the threats aren't quite so serious read more »

Even rivals are waiting for Apple to get into wearables

Market not worth spit much less the time and money unless someone transforms the category, argues analyst read more »

iOS 8 – What you need to know

Accenture's mobile expert gives businesses advice on how to prepare for the new Apple operating system read more »

Beware the next circle of hell: Unpatchable systems

Insecure by design and trusted by default, embedded systems present security concerns that could prove crippling read more »

more in depth ..
User authentication Slideshows

7 futuristic authentication systems DARPA is funding

From analysing the way you walk to your heartbeat, these password killers could be here soon. read more »

The 10 most terrifying security nightmares revealed at the Black Hat and Def Con hacker conferences

Hacked planes. Unstoppable, utterly malicious flash drives. Hotel automation gone crazy. These are the 10 most terrifying security stories out of the premier hacker and security conferences in Las Vegas. read more »

Six tips to protect employees from phishing attacks

Make sure no-one gets a good catch at an employee's expense - consumer security provider BullGuard has put together a few tips on Phishing prevention read more »

11 Android tools for web developers

Android mobile devices, while not typically thought of as places where development work gets done, can offer surprisingly useful apps to help developers get the job done, anywhere. read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open