The Wayback Machine - https://web.archive.org/web/20130806181641/http://www.computerworlduk.com/security/

Security

RSS FeedSecurity also in this channel

Security Newsletter

Latest News

TOR Project: Stop using Windows, disable JavaScript

TOR Project: Stop using Windows, disable JavaScript

The TOR Project is advising that people stop using Windows after the discovery of a startling vulnerability in Firefox that undermined the main advantages of the privacy-centered network. read more »

Phishing attacks show sudden drop as criminals use servers for DDoS

Phishing attacks appear to be falling back to their pre-2012 levels after the Anti-Phishing Working Group (APWG) recorded a sudden 20 percent fall in activity for the first quarter of 2013. read more »

Jimmy Wales says David Cameron's porn filters are 'ridiculous'

Wikipedia co-founder Jimmy Wales, a key technology adviser to prime minister David Cameron, has slammed the government's demand that ISPs should introduce porn filters by default, saying the move is "ridiculous". read more »

Twitter introduces 'in-tweet' abuse button after complaints

Twitter has revised its guidelines around abusive behavior following bomb and rape threats made against several prominent female users of the service in the U.K. read more »

Will Smith drops in to Defcon hacker conference

American actor Will Smith captured the attention of Defcon attendees when he showed up unexpectedly at the hacker conference on Sunday apparently to do research for an upcoming movie. read more »

more news ..
Advertisement

Lexmark Webcast

Getting Office Optimisation Right For Your Organisation

Watch this on demand webinar which explores the hidden costs in document processing technology.


Google Nexus series

Google Nexus series

The latest news, features and slideshows about Google's Nexus series, including the Nexus 4 smartphone and Nexus 10 tablet.


TeamQuest

Accelerate Your IT Efficiency

View the latest capacity management resources including white papers, videos and news.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


In Depth

Security Manager's Journal: Suddenly, our firewall audit can't wait

After a DDoS attack was discovered by chance, 'later this year' is too long to wait. read more »

Why we can't stop malicious insiders?

Security experts have been saying for years that insiders -- malicious, careless or simply unaware -- are a greater threat to organizations, both public and private, than hackers. read more »

Westminster View: Digital Government, rights and responsibilities

It is a terrible irony if, as the Government squabbled with itself over the breadth of its mishandled Communications Data Bill, some of its most contentious provisions were already in effect via the back door as Sharmi Chakrabati, director of human rights group Liberty puts it, through the no-longer secret US spy programme, PRISM. read more »

Seven essentials for defending against DDoS attacks

Go ahead and ask CSOs from the nation's largest banks about the myriad distributed denial-of-service (DDoS) attacks they've experienced in recent months. They're not going to tell you anything. read more »

Adobe's first CSO: Hosted services security is top priority

Adobe Systems has appointed Brad Arkin, the company's senior director of security for products and services, to become its first CSO. With a mature product security program already in place, the top priorities for Adobe's new security chief are to strengthen the security of the company's hosted services and its internal infrastructure. read more »

more in depth ..
Most Popular in Security

Angry football fans aiming cyber attacks at UEFA website

Rise of hactivism impacting Euro governing body as fans protest dodgy referee decisions

15 free security tools you should try

Here are some of the best-known free security tools you can try inside your own network

Inside the US government's cyber security headquarters

Take a tour of ICS-CERT facilities at Idaho National Labs

How to hack an iPad

Prevent access with a four-digit PIN code or beware - your device can be hacked!

UK state made over 570,000 requests last year to seize citizens' private data

There was a 16 percent rise in such requests when compared to 2011

When in China, don't leave your laptop alone, or spyware will be installed

If you travel to China or Russia, assume government or industry spooks will steal your data and install spyware. Here's how to thwart them

How to secure your files in the cloud with Dropbox

Simple tips to stop online attackers seeing your data

Why we can't stop malicious insiders?

Around 1.4m people in US have top secret clearance so leaks will happen

White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..
Blogs

Amazon and AWS validate the value of portable identity

There's no such thing as a B2C or B2E identity in isolation anymoreread more »

Counter-Strike?

Get realread more »

more blogs ..
Advertisement
ComputerworldUK Poll
Solution Centres

Business IT Hub

Business IT Hub

View the latest exclusive content, including interactive video, opinion and whitepapers Read more...


HP Data Protection Zone

HP Data Protection Zone

HP Data Protection Zone is your source for software downloads, video, whitepapers and news on how you can keep your business data safe. Read more...


Desktop Virtualization Solutions

Accelerate Your IT Efficiency

View the latest capacity management resources including white papers, videos and news.


Advertisement

ComputerworldUK Webcast

Open