The Wayback Machine - https://web.archive.org/web/20130426073056/http://www.computerworlduk.com/security/

Security

RSS FeedSecurity also in this channel

Security Newsletter

Latest News

Judge rejects FBI's bid to hack computer of suspect in attempted cyberheist

A federal court in Houston has rejected an FBI request for a warrant to hack into the computer of a suspect in an attempted cyberheist. read more »

InfoSec: Understanding business goals is key to embedding company-wide security practices

Information security managers need to better align themselves with company business goals help embed security practices in an organisation, according to speakers at InfoSec 2013. read more »

Vulnerable terminal servers could let bad guys hack stoplights, gas pumps

Thousands of older systems, including those used to manage traffic lights, fuel pumps, point-of-sale terminals and building automation can be tampered with because they're insecurely connected to the Internet. read more »

Chinese industrial espionage now a major cause of data breaches, Verizon report finds

Industrial espionage by Chinese “state-affiliated actors” was responsible for one in five data breaches reported to Verizon by customers and through a range of global police forces, the company’s annual Data Breach Investigations Report (DBIR) has found. read more »

Botnets target social networks with spam

Life for a phony profile on Twitter may be short, but it isn't deterring spammers from continuing to work their scams on social networkers, says one security researcher. read more »

more news ..
Advertisement
What people are saying about...

BlackBerryRT @BlackBerryTH: ปลุก #BlackBerryZ10 ให้ตื่นได้ง่ายๆเพียง สไลด์จากโลโก้ #BlackBerry ขึ้นไปด้านบนครับ http://t.co/exWUElF8hr

I'm playing #THKLive on #BlackBerry at a $5K table.

#BlackBerry Q10 Gets Keyboard Optimised #Skype and #WhatsApp | TechWeekEurope UK http://t.co/lXU4NyjEOK

@G_a_b_s Jajajaja otro que cae!! #BlackBerry ?? Ni qué fuera albañil


Realising Business Value In The Cloud

Realising Business Value In The Cloud

Join this live discussion for authoritative content & advice on delivering enterprise applications in the cloud.


Google Nexus series

Google Nexus series

The latest news, features and slideshows about Google's Nexus series, including the Nexus 4 smartphone and Nexus 10 tablet.


TeamQuest

Accelerate Your IT Efficiency

View the latest capacity management resources including white papers, videos and news.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


In Depth

Ten tips to win security programme funding

Ask any cyber security specialist what their biggest challenge is, and you will get a variety of answers -- ranging from strengthening network security, to managing internal threats, to protecting against cyber espionage. But upon further investigation, you may be surprised to learn that for manythe biggest challenge is simply getting the funding necessary to carry out a security programme. read more »

Security Manager's Journal: A little housecleaning

Our manager finds the time and opportunity to cross a few nagging items off of his to-do list. read more »

Three simple steps to determine risk tolerance

For Chief Information Security Offiers, in addition to deciding what policies, processes, or technology an organisation should have in place, an even more significant challenge is successfully negotiating disputed risk issues. read more »

Cyber confusion at the heart of Government

Last week the Conservative chairman of the Defence Select Committee took the extraordinary step of writing to the Government to blast its response to the Committee’s recent report on cyber security. James Arbuthnot said the Government exaggerated the amount of money going to the Defence Science and Technology Laboratory’s Cyber and Influence Centre, was not acting quickly enough to secure military supply chains and were basically passing the civil cyber security buck. read more »

Security Manager's Journal: Spam makes a comeback

Out of the blue, phishing attacks previously caught in the spam filter are getting through to employee inboxes. read more »

more in depth ..
Most Popular in Security

Ten tips to win security programme funding

CIO for Los Angeles World Airports outlines ten essential tips for getting your financial team on board with your security funding requests

15 free security tools you should try

Here are some of the best-known free security tools you can try inside your own network

Security Manager's Journal: A little housecleaning

IT risk assessment frameworks: real-world experience

How to manage information security risks

Chinese industrial espionage now a major cause of data breaches, Verizon report finds

'State-affiliated actors' looking for IP

How to hack an iPad

Prevent access with a four-digit PIN code or beware - your device can be hacked!

12 useful websites for IT security

From Microsoft and Cisco to the National Institute of Standards and Technology, we look at some of the most useful IT security websites

BT security chief: We are ‘struggling and overly conservative’ on BYOD and cloud

Jill Knesek was speaking this week at CA’s annual conference in Las Vegas

White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..
Advertisement
ComputerworldUK Poll
Solution Centres

Business IT Hub

Business IT Hub

View the latest exclusive content, including interactive video, opinion and whitepapers Read more...


HP Data Protection Zone

HP Data Protection Zone

HP Data Protection Zone is your source for software downloads, video, whitepapers and news on how you can keep your business data safe. Read more...


Desktop Virtualization Solutions

Accelerate Your IT Efficiency

View the latest capacity management resources including white papers, videos and news.


Advertisement

White paper Promotion

Open