Latest News
TOR Project: Stop using Windows, disable JavaScript
The TOR Project is advising that people stop using Windows after the discovery of a startling vulnerability in Firefox that undermined the main advantages of the privacy-centered network. read more »
Phishing attacks show sudden drop as criminals use servers for DDoS
Phishing attacks appear to be falling back to their pre-2012 levels after the Anti-Phishing Working Group (APWG) recorded a sudden 20 percent fall in activity for the first quarter of 2013. read more »
Jimmy Wales says David Cameron's porn filters are 'ridiculous'
Wikipedia co-founder Jimmy Wales, a key technology adviser to prime minister David Cameron, has slammed the government's demand that ISPs should introduce porn filters by default, saying the move is "ridiculous". read more »
Twitter introduces 'in-tweet' abuse button after complaints
Twitter has revised its guidelines around abusive behavior following bomb and rape threats made against several prominent female users of the service in the U.K. read more »
Will Smith drops in to Defcon hacker conference
American actor Will Smith captured the attention of Defcon attendees when he showed up unexpectedly at the hacker conference on Sunday apparently to do research for an upcoming movie. read more »
more news ..Getting Office Optimisation Right For Your Organisation
Watch this on demand webinar which explores the hidden costs in document processing technology.
Google Nexus series
The latest news, features and slideshows about Google's Nexus series, including the Nexus 4 smartphone and Nexus 10 tablet.
Accelerate Your IT Efficiency
View the latest capacity management resources including white papers, videos and news.
Windows 8
Check out our latest articles on Microsoft's next-generation operating system.
In Depth
Security Manager's Journal: Suddenly, our firewall audit can't wait
After a DDoS attack was discovered by chance, 'later this year' is too long to wait. read more »
Why we can't stop malicious insiders?
Security experts have been saying for years that insiders -- malicious, careless or simply unaware -- are a greater threat to organizations, both public and private, than hackers. read more »
Westminster View: Digital Government, rights and responsibilities
It is a terrible irony if, as the Government squabbled with itself over the breadth of its mishandled Communications Data Bill, some of its most contentious provisions were already in effect via the back door as Sharmi Chakrabati, director of human rights group Liberty puts it, through the no-longer secret US spy programme, PRISM. read more »
Seven essentials for defending against DDoS attacks
Go ahead and ask CSOs from the nation's largest banks about the myriad distributed denial-of-service (DDoS) attacks they've experienced in recent months. They're not going to tell you anything. read more »
Adobe's first CSO: Hosted services security is top priority
Adobe Systems has appointed Brad Arkin, the company's senior director of security for products and services, to become its first CSO. With a mature product security program already in place, the top priorities for Adobe's new security chief are to strengthen the security of the company's hosted services and its internal infrastructure. read more »
more in depth ..Editor's Pick
Privacy International sues UK government over surveillance programs
Government and defence firms team up to fight cyber threats
EU Parliament approves stricter penalties for cyber attacks
Most Popular in Security
Angry football fans aiming cyber attacks at UEFA website
Rise of hactivism impacting Euro governing body as fans protest dodgy referee decisions
15 free security tools you should try
Here are some of the best-known free security tools you can try inside your own network
Inside the US government's cyber security headquarters
Take a tour of ICS-CERT facilities at Idaho National Labs
How to hack an iPad
Prevent access with a four-digit PIN code or beware - your device can be hacked!
UK state made over 570,000 requests last year to seize citizens' private data
There was a 16 percent rise in such requests when compared to 2011
When in China, don't leave your laptop alone, or spyware will be installed
If you travel to China or Russia, assume government or industry spooks will steal your data and install spyware. Here's how to thwart them
How to secure your files in the cloud with Dropbox
Simple tips to stop online attackers seeing your data
Why we can't stop malicious insiders?
Around 1.4m people in US have top secret clearance so leaks will happen
White Papers
Avoiding the 7 Deadly Sins of IT Security
Prevention is more important than detection read more »
What Do You Mean My Cloud Data Isn’t Secure?
Understanding your level of data protection read more »
more white papers ..Blogs
Amazon and AWS validate the value of portable identity
There's no such thing as a B2C or B2E identity in isolation anymoreread more »
Counter-Strike?
Get realread more »
more blogs ..Also in slideshows :
ComputerworldUK Poll
Solution Centres
Business IT Hub
View the latest exclusive content, including interactive video, opinion and whitepapers Read more...
HP Data Protection Zone
HP Data Protection Zone is your source for software downloads, video, whitepapers and news on how you can keep your business data safe. Read more...
Accelerate Your IT Efficiency
View the latest capacity management resources including white papers, videos and news.
















