The Wayback Machine - https://web.archive.org/web/20130426104447/http://www.computerworlduk.com/topics/hacker/

Hacker

Hacker News

Cyberattackers target drones with malware

Researchers highlight efforts to steal tech secrets read more »

AP Twitter hack prompts fresh look at cybersecurity needs

Two-step identity verification and analysis of user trends could prevent future attacks, experts say read more »

Chinese industrial espionage now a major cause of data breaches, Verizon report finds

'State-affiliated actors' looking for IP read more »

LulzSec 'leader' charged in Australia

IT professional who had access to sensitive information, Australian Federal Police said read more »

Browsers pose the greatest threat to enterprise, Microsoft reports

Committed to Internet Explorer, Microsoft is experimenting with an architecture to replace the browser read more »

Researchers warn malware targeting online stock trading software

The malware is the result of a growing trend of cybercriminals targeting online brokerage accounts, Group-IB researchers say read more »

more news ..
Making mobile and cloud work for you

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing-Learn how to effectively deliver mobile work styles and cloud services together.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


TeamQuest

Accelerate Your IT Efficiency

View the latest capacity management resources including whitepapers, videos and news.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Hacker In Depth

Unseen, all-out cyber war on the US has begun

Security pros and government officials warn of a possible cyber 9/11 involving banks, utilities, other companies, or the Internet read more »

2012 - The year in quotes

Some of the most interesting, and amusing, tech-related quotes this year were uttered in courtrooms read more »

The 3 biggest threats to your cloud data

Virtually no one has even one decade of experience running major SaaS applications, so we should be prepared for some surprises read more »

10 reasons to choose Ubuntu 12.10 over Windows 8

Canonical has touted its new OS as a good way to 'avoid the pain of Windows 8' - Here's why you should take up the challenge read more »

How your company can avoid cyber espionage attacks

To properly protect your company against attacks, it's imperative that you take precautions read more »

How to prepare your business for digital disaster

Whether thieves or tornadoes threaten your company, protecting your assets from utter catastrophe is easier than you think. read more »

more in depth ..
Hacker Slideshows

Raspberry Pi hacks - Linux laptops and supercomputers

The Raspberry Pi is a stripped-down Linux PC consisting of a tiny circuit board, an ARM-based CPU, and a graphics processor - and inspiration for creative hacks read more »

The sorriest tech companies of 2012

No, really, they're sorry! Vendors apologise in 2012 for everything from Apple Maps to Cisco Connect Cloud to outage after outage and breach after breach read more »

Inside the US government's cyber security headquarters

Take a tour of ICS-CERT facilities at Idaho National Labs read more »

Facebook's ten biggest strategic mistakes

The ten most significant blunders that the company has made in its short history read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

White paper promotion

Open