Legal

Video

Computerworld Tech Update: 02 - 06 December, 2013

In this roundup of tech news from ComputerWorld for the week 02 - 06 December, 2013, we talk about Amazon Drone, Twitter fake followers, Indian Smartphone market, Botnet and Google's Compute Engine.

Computerworld Tech Update: 28 - 31 Oct, 2013

In this roundup of tech news for the week 28 - 31 October, 2013 we talk about Infosys, Dell, cyber crime and enterprise cloud.

Oracle vs. Google: Larry Ellison Arrives for Testimony

Day two of the trial between Oracle and Google is underway in San Francisco.

More

News

Romanian Gang Used Malware to Defraud International Money Transfer Firms

Romanian and French authorities have dismantled a cybercriminal network that infected computers at money transfer outlets across Europe and used them to perform illegal transactions.

No-IP Regains Control of Some Domains Wrested by Microsoft

A Nevada-based company has regained control of the majority of domains seized by Microsoft in a legal action aimed at shutting down botnets.

Physical Location of Data to Become Irrelevant in Post-Snowden Era: Gartner

The physical location of data will become increasingly irrelevant in the post-Snowden era, according to Gartner.

More

Opinion

Into Malware? Time to Play in the Cuckoo Sandbox

Have a taste for tearing apart malware? Then you have probable played with Cuckoo Sandbox. If not, it is really time to take a poke at it.

Everything You Know About Enterprise Security Is Wrong

Whether you're talking about your network, your company's building or your home, a perimeter approach to security is no longer adequate. As McAfee discussed at this week's RSA Conference, you can't provide physical or electronic security simply by trying to prevent authorized access -- you have to rethink all types to security to protect data and lives.

McAfee Offers Global Response to Nationalized Malware

In medieval times, kings let barbarians break down the castle gates but made sure they paid the price once they got inside. McAfee's approach to security takes a similar approach -- since data breaches are inevitable, companies should worry less about the perimeter and more on catching the bad guys in the act.

More