Computerworld holiday gift guide 2015
InfoWorld 2015 geek gadget gift guide

Lenovo store in China

Lenovo patches serious vulnerabilities in PC system update tool

For the third time in less than six months PC manufacturer Lenovo has had to update the System Update tool pre-loaded on some of its products for security reasons.


Southeast Europe – cybercrime's newest scene?

Improving the level of IT security is the top investment priority for Bulgarian financial institutions.

cybersecurity boards

Pure play cybersecurity firms in your backyard

These are cyber fighters you can dial up if the growing cybercrime epidemic has you on the edge.

dido harding ceo of talktalk

Police arrest blackmail suspect in TalkTalk data breach case

Police believe they may have found the person who tried to blackmail the CEO of TalkTalk, the U.K. telecommunications company that was the target of a data breach.

turkey balloon float macys thanksgiving day parade

10 reasons for CSOs to be thankful

The attack surface continues to expand and has made the job of the CSO increasingly complex and challenging. It’s not just technology alone anymore but increasingly it takes the village to secure the enterprise.


This gizmo knows your Amex card number before you've received it

A device built by legendary hacker Samy Kamkar calls into question the security of payment cards as the U.S. continues to grapples with card fraud.

red carpet

Dyann Bradbury on the pathway to the security talent we crave

Dyann Bradbury shares her Point of View (POV) on the pathway to talent as part of Leading Security Change

dell xps 13 15

And then there were two: Another dangerous Dell root certificate discovered

After Dell confirmed that one of its support tools installed a dangerous self-signed root certificate and private key on computers, users discovered a similar certificate deployed by a different Dell tool.

hilton istanbul exterior hr

Hilton says malware targeted its credit card system

Hilton Worldwide says it has identified and removed malware that targeted card payment systems at some of its hotels over a 17-week period from late 2014 to mid 2015.


Get to know the iPad Pro

Take a closer look at Apple's mega-tablet, the iPad Pro with the Smart Keyboard and Pencil.

victim identity theft computer problem

What you need to know about Dell's root certificate security debacle

In an attempt to provide a more streamlined remote support experience, Dell installed a self-signed root certificate and corresponding private key on its customers' computers, exposing users' encrypted communications to potential...

Amazon e-reader comparison

Kindle vs Fire: How to choose the right Amazon e-reader

So you’ve narrowed the e-reader field to Amazon’s lineup. We’ll help you pick the right model for your needs.

pc gamer gifts msi 2

9 killer gifts for PC gamers

Give your gamer something more than a Hot Pocket and Mountain Dew this holiday season.

best tech for travelers primary

12 travel-friendly tech gifts you'll want to take with you

The travel-friendly tech in this gift guide can save your favorite frequent flier some stress on their next trip. Whether it's a clip-on camera accessory or a great organizer, it's all worth taking with you.

kid bb8 1

5 high-tech toys to delight kids of all ages

Let's face it—you're going to have as much fun with these toys as your kids will. And that's just fine.

Smart-home gifts

5 awesome gifts for smart-home enthusiasts

Armed with this gift guide, you can transform an ordinary house into a smart and secure home for the modern age.

black friday

Retailers targeted by sophisticated ModPOS malware

The ModPOS malware has already hit multiple national retailers and compromised millions of cards, according to new research released this morning, but there are likely to be more infections still out there since this particular...

encryption yiaw4a

An encryption back door won’t actually help intelligence agencies

Intelligence agencies and law enforcement claim they need a back door in encryption algorithms for safety and national security, but the logic is flawed and the fallout from an encryption back door would do more harm than good.

Load More