Hacker
Hacker News
Cyberattackers target drones with malware
Researchers highlight efforts to steal tech secrets read more »
AP Twitter hack prompts fresh look at cybersecurity needs
Two-step identity verification and analysis of user trends could prevent future attacks, experts say read more »
Chinese industrial espionage now a major cause of data breaches, Verizon report finds
'State-affiliated actors' looking for IP read more »
LulzSec 'leader' charged in Australia
IT professional who had access to sensitive information, Australian Federal Police said read more »
Browsers pose the greatest threat to enterprise, Microsoft reports
Committed to Internet Explorer, Microsoft is experimenting with an architecture to replace the browser read more »
Researchers warn malware targeting online stock trading software
The malware is the result of a growing trend of cybercriminals targeting online brokerage accounts, Group-IB researchers say read more »
more news ..Hacker Blogs
Active Defence: Adapting cyber defences to the threat
The Future of Commercial Open Source: Foundations
The Great "Cyber" Con
A 2012 security incident recap by the numbers
more blogs ..From Wow to How : Making mobile and cloud work for you
On demand Biztech Briefing-Learn how to effectively deliver mobile work styles and cloud services together.
Windows 8
Check out our latest articles on Microsoft's next-generation operating system.
Accelerate Your IT Efficiency
View the latest capacity management resources including whitepapers, videos and news.
HP acquisitions
Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.
Hacker In Depth
Unseen, all-out cyber war on the US has begun
Security pros and government officials warn of a possible cyber 9/11 involving banks, utilities, other companies, or the Internet read more »
2012 - The year in quotes
Some of the most interesting, and amusing, tech-related quotes this year were uttered in courtrooms read more »
The 3 biggest threats to your cloud data
Virtually no one has even one decade of experience running major SaaS applications, so we should be prepared for some surprises read more »
10 reasons to choose Ubuntu 12.10 over Windows 8
Canonical has touted its new OS as a good way to 'avoid the pain of Windows 8' - Here's why you should take up the challenge read more »
How your company can avoid cyber espionage attacks
To properly protect your company against attacks, it's imperative that you take precautions read more »
How to prepare your business for digital disaster
Whether thieves or tornadoes threaten your company, protecting your assets from utter catastrophe is easier than you think. read more »
more in depth ..Hacker Slideshows
Raspberry Pi hacks - Linux laptops and supercomputers
The Raspberry Pi is a stripped-down Linux PC consisting of a tiny circuit board, an ARM-based CPU, and a graphics processor - and inspiration for creative hacks read more »
The sorriest tech companies of 2012
No, really, they're sorry! Vendors apologise in 2012 for everything from Apple Maps to Cisco Connect Cloud to outage after outage and breach after breach read more »
Inside the US government's cyber security headquarters
Take a tour of ICS-CERT facilities at Idaho National Labs read more »
Facebook's ten biggest strategic mistakes
The ten most significant blunders that the company has made in its short history read more »
more slideshows ..White Papers
Avoiding the 7 Deadly Sins of IT Security
Prevention is more important than detection read more »
What Do You Mean My Cloud Data Isn’t Secure?
Understanding your level of data protection read more »
more white papers ..












