Hacker
Hacker News
Will Smith drops in to Defcon hacker conference
Men in Black actor tries Black Hat conference for size read more »
Android one-click Google authentication poses corporate risk
Researcher releases proof-of-concept Android app that can steal 'weblogin' authentication tokens for Google accounts read more »
Attackers turning to legit cloud services firms to plant malware
Researchers see significant growth in number of malware writers using services like Google Code to distribute their malicious wares read more »
Facebook turns on secure browsing by default
Facebook plans to continue upgrading its security infrastructure throughout this year read more »
Researchers exploit cellular tech flaws to intercept phone calls
Femtocells used to boost corporate cellular coverage can be tweaked to listen in on calls and steal data, researchers say at Black Hat read more »
Bogus Chrome, Firefox extensions pilfer social media accounts
The extensions carry what could be a stolen digital signature, according to Trend Micro read more »
more news ..Hacker Blogs
For "software-is-the-brand" companies, technology is the supply chain
How to make sure you don't end up with a Snowden-sized security leak
BSA Study Demonstrates Open Source's Economic Advantage
Active Defence: Adapting cyber defences to the threat
more blogs ..Getting Office Optimisation Right For Your Organisation
Watch this on demand webinar which explores the hidden costs in document processing technology.
Windows 8
Check out our latest articles on Microsoft's next-generation operating system.
Accelerate Your IT Efficiency
View the latest capacity management resources including whitepapers, videos and news.
HP acquisitions
Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.
Hacker In Depth
Wi-Fi tweaks for speed freaks: 2013 edition
How many devices do you have on your home Wi-Fi? That many? Here are some strategies for optimizing your wireless performance. read more »
Why we can't stop malicious insiders?
Around 1.4m people in US have top secret clearance so leaks will happen read more »
Seven essentials for defending against DDoS attacks
As hackers get stealthier and more vicious, security leaders across all industries need to be prepared read more »
Unseen, all-out cyber war on the US has begun
Security pros and government officials warn of a possible cyber 9/11 involving banks, utilities, other companies, or the Internet read more »
2012 - The year in quotes
Some of the most interesting, and amusing, tech-related quotes this year were uttered in courtrooms read more »
The 3 biggest threats to your cloud data
Virtually no one has even one decade of experience running major SaaS applications, so we should be prepared for some surprises read more »
more in depth ..Hacker Slideshows
Raspberry Pi hacks - Linux laptops and supercomputers
The Raspberry Pi is a stripped-down Linux PC consisting of a tiny circuit board, an ARM-based CPU, and a graphics processor - and inspiration for creative hacks read more »
The sorriest tech companies of 2012
No, really, they're sorry! Vendors apologise in 2012 for everything from Apple Maps to Cisco Connect Cloud to outage after outage and breach after breach read more »
Inside the US government's cyber security headquarters
Take a tour of ICS-CERT facilities at Idaho National Labs read more »
Facebook's ten biggest strategic mistakes
The ten most significant blunders that the company has made in its short history read more »
more slideshows ..White Papers
Avoiding the 7 Deadly Sins of IT Security
Prevention is more important than detection read more »
What Do You Mean My Cloud Data Isn’t Secure?
Understanding your level of data protection read more »
more white papers ..












