Cyber Crime

Cyber Crime | News, how-tos, features, reviews, and videos

CSO slideshow - Insider Security Breaches - Spam email identified
security threats and vulnerabilities

business travel / airport terminal walkway / traveller

What you need to know about new data-security rules for business travel

From U.S. Customs agents to cybercriminals, everyone wants to copy the data on your phone and laptop. Here’s how to protect your rights and also avoid industrial espionage.

Computerworld Cheat Sheet - Microsoft Excel 2016

Excel 2016 and 2019 cheat sheet: Ribbon quick reference

Our visual guide helps you find the most popular commands on the Ribbon in Excel 2016 and 2019 for Windows, along with keyboard shortcuts for performing each action.

Computerworld Cheat Sheet - Microsoft Outlook 2016

Outlook 2016 cheat sheet: Ribbon quick reference

Our visual guide helps you find the most useful commands on the Ribbon in Outlook 2016 for Windows, along with keyboard shortcuts for performing each action.

Computerworld Cheat Sheet - Microsoft PowerPoint 2016

PowerPoint 2016 cheat sheet: Ribbon quick reference

Our visual guide helps you find the most useful commands on the Ribbon in PowerPoint 2016 for Windows, along with keyboard shortcuts for performing each action.

Apple iPhone passcode ID

Easy way to bypass passcode lock screens on iPhones, iPads running iOS 12

Apple has not patched the hole allowing you to bypass the lock screen on iPhones that have Touch ID. As of iOS 12, you can still trick Siri into getting into a person’s iPhone.

template c100.00 03 57 09.still001
video

An inside look at hybrid Office 365 phishing attacks | Salted Hash Ep 41

In this episode, Steve Ragan shows what a hybrid phishing attack looks like as it starts off on one service, and quickly moves to another.

template c100.00 06 55 04.still001
video

What is a phishing kit? Watch this in-depth explainer | Salted Hash Ep 39

What is a phishing kit? In this video, Steve Ragan offers an answer and a look at some of the kits Salted Hash has collected.

template c100.00 03 35 22.still001
video

An introduction to Kit Hunter, a phishing kit detector | Salted Hash Ep 40

Kit Hunter, a basic Python script written by host Steve Ragan, searches on common tag elements to find hidden phishing kits on a web server.

salted hash thumbnail multi final
video

Phishing problems: 3.2M emails blocked in a month | Salted Hash Ep 37

Asaf Cidon, vice president of email security at Barracuda Networks, talks with host Steve Ragan about a recent uptick in phishing attacks, including a spike in business email compromise (BEC) attacks.

salted hash thumbnail multi final
video

The risks associated with global Internationalized Domain Names | Salted Hash Ep 36

Paul Vixie, CEO of Farsight Security, explains how global Internationalized Domain Names, or global IDNs, sparked the emergence of confusingly similar website addresses with nefarious goals -- and how to combat them.

salted hash thumbnail final
video

The difference between red team engagements and vulnerability assessments | Salted Hash Ep 34

In this episode, host Steve Ragan talks with Phil Grimes, Professional Services Lead at RedLegg, about the challenges of educating customers — and building a partnership with them — to create successful red team engagements.

search data analysis laptop

Best Places to Work in IT archives, 1994 to 2018

See 25 years of Computerworld's Best Places to Work in IT lists in an easy-to-sort spreadsheet.

Best Places to Work in IT 2018 cover

Download the 2018 Best Places to Work in IT special report

Our 25th annual report highlights 100 top organizations across the country that attract skilled tech professionals by offering robust salaries, stellar benefits, and flexible, fast-paced work environments.

template c100.00 06 00 09.still001
video

What an Apple phishing attack looks like | Salted Hash Ep 32

How can you tell the difference between a legitimate email and a phishing attack? Host Steve Ragan shows what an Apple phishing attack looks like, screen by screen, showing the difference between the real and the fake.

adrian sanabria
video

Is it time to kill the pen test? | Salted Hash Ep 22

Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Adrian Sanabria, director of research at Savage Security, about de-emphasizing network penetration tests to put more focus on attack simulations and helping...

Windows 10 Start menu on desktop

Windows 10 cheat sheet: Handy gestures and shortcuts

Learn these useful touchpad gestures, keyboard shortcuts and touchscreen gestures for getting around Windows 10.

Computerworld - Best of Shark Tank, Winter 2018

Best of Shark Tank

Take a look back at some of the timeless tales that caught Sharky’s attention over the past year.

Computerworld Cheat Sheet - Microsoft Word 2016

Word 2016 cheat sheet: Ribbon quick reference

Our visual guide helps you find the most useful commands on the Ribbon in Word 2016 for Windows, along with keyboard shortcuts for performing each action.

Load More