The Wayback Machine - https://web.archive.org/web/20130807015223/http://www.computerworlduk.com/topics/hacker/

Hacker

Hacker News

Will Smith drops in to Defcon hacker conference

Men in Black actor tries Black Hat conference for size read more »

Android one-click Google authentication poses corporate risk

Researcher releases proof-of-concept Android app that can steal 'weblogin' authentication tokens for Google accounts read more »

Attackers turning to legit cloud services firms to plant malware

Researchers see significant growth in number of malware writers using services like Google Code to distribute their malicious wares read more »

Facebook turns on secure browsing by default

Facebook plans to continue upgrading its security infrastructure throughout this year read more »

Researchers exploit cellular tech flaws to intercept phone calls

Femtocells used to boost corporate cellular coverage can be tweaked to listen in on calls and steal data, researchers say at Black Hat read more »

Bogus Chrome, Firefox extensions pilfer social media accounts

The extensions carry what could be a stolen digital signature, according to Trend Micro read more »

more news ..

Getting Office Optimisation Right For Your Organisation

Watch this on demand webinar which explores the hidden costs in document processing technology.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


TeamQuest

Accelerate Your IT Efficiency

View the latest capacity management resources including whitepapers, videos and news.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Hacker In Depth

Wi-Fi tweaks for speed freaks: 2013 edition

How many devices do you have on your home Wi-Fi? That many? Here are some strategies for optimizing your wireless performance. read more »

Why we can't stop malicious insiders?

Around 1.4m people in US have top secret clearance so leaks will happen read more »

Seven essentials for defending against DDoS attacks

As hackers get stealthier and more vicious, security leaders across all industries need to be prepared read more »

Unseen, all-out cyber war on the US has begun

Security pros and government officials warn of a possible cyber 9/11 involving banks, utilities, other companies, or the Internet read more »

2012 - The year in quotes

Some of the most interesting, and amusing, tech-related quotes this year were uttered in courtrooms read more »

The 3 biggest threats to your cloud data

Virtually no one has even one decade of experience running major SaaS applications, so we should be prepared for some surprises read more »

more in depth ..
Hacker Slideshows

Raspberry Pi hacks - Linux laptops and supercomputers

The Raspberry Pi is a stripped-down Linux PC consisting of a tiny circuit board, an ARM-based CPU, and a graphics processor - and inspiration for creative hacks read more »

The sorriest tech companies of 2012

No, really, they're sorry! Vendors apologise in 2012 for everything from Apple Maps to Cisco Connect Cloud to outage after outage and breach after breach read more »

Inside the US government's cyber security headquarters

Take a tour of ICS-CERT facilities at Idaho National Labs read more »

Facebook's ten biggest strategic mistakes

The ten most significant blunders that the company has made in its short history read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

ComputerworldUK Webcast

Open