Yahoo

Yahoo News

Apple's iCloud targeted in man-in-the-middle attack in China

Yahoo has also been facing a similar attack in China read more »

Google considers Amazon as its biggest search competitor

People looking to buy something are more likely to search on Amazon, said Eric Schmidt read more »

Twitter sues for right to reveal more about national security requests

Current laws violate Twitter's First Amendment rights, the company says read more »

Data leak lets out account information from bond insurer MBIA

The data includes account numbers, balances and more, according to a security blog read more »

Yahoo says attackers looking for Shellshock found a different bug

The bug has now been fixed and user data was not at risk, the company said read more »

Google bows to pressure, removes news snippets from German search results

Google users looking for news from some German sites will see only a headline from now on read more »

more news ..
Yahoo Blogs

Security's biggest challenge is the unknown

Defeating cyber-criminals demands that we train more and better professionals read more »

Is Mozilla Selling Out?

read more »

Cybersecurity 2014 - human defences hold the key

The demand for skilled security professionals will only grow read more »

Cybersecurity 2014 - human defences hold the key

The demand for skilled security professionals will only grow read more »

more blogs ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Yahoo In Depth

Opinion: It's time for technology to benefit from the female touch

Ocado Technology's COO explains why it, and other companies, should help bridge the technology gender gap read more »

OpenDaylight Executive Director spells out open source SDN efforts progress

Neela Jacques explains where the standards stand read more »

How to spot a tech company that's about to lose

If you're buying IT products and services, you need to be able to spot potential failures read more »

Is the FTSE 350 hiding behind token women appointments?

There are just 16 female executives in the first five FTSE 100 companies and technology firms fare even worse read more »

Is EU's 'right to be forgotten' really the 'right to edit the truth'?

Analysts say it's doubtful the EU's ruling on Google will be repeated in the U.S. read more »

Security Manager's Journal: Thousands of dollars in phone calls? Management hates that

We got our money back... read more »

more in depth ..
Yahoo Slideshows

iOS 8 tips & tricks: Get to know iOS 8's best new features

iOS 8 has lots of new features, many of which you might not have discovered yet! Here are the top iOS 8 tips and tricks. read more »

The new Microsoft under Satya Nadella

The Microsoft CEO has set new goals, taken some decisive actions, moved ahead with works already in progress and made Wall Street happy read more »

Six tips to protect employees from phishing attacks

Make sure no-one gets a good catch at an employee's expense - consumer security provider BullGuard has put together a few tips on Phishing prevention read more »

Are you a digital business bozo? Nine mistakes that will drive customers away

Mistakes for tech start-ups to avoid read more »

more slideshows ..
White Papers

Analyst Paper: Total Cost of Ownership

IBM WebSphere Application Server v7 vs. JBoss EAP v5 TCO Analysis read more »

A Comprehensive Range of Solutions for All Types of UC Users and Applications

Virtual teams can better collaborate read more »

more white papers ..

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open