Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

SECURITY

Features

Latest Security articles


How the Internet of Things is transforming law enforcement

From connected guns to wearables for canine units, the IoT is spurring change in the law enforcement field.

Mike Lynch-backed Darktrace takes new approach to security

Monitors behaviour of people inside the network instead of trying to keep them out

The Internet of Things gets real

Interest is growing but sandardsa nd interoperability issues remain

Google’s 2-Step Verification – why everybody should turn this on now

Google has announced 2-Step Verification using a USB Security Key. But what is 2-Step verification and should more people use it?

Android 5.0 Lollipop – top enterprise security features

Android 5.0 is Google's sweetest security update so far

Microsoft Security Essentials may be throwing false positives for Trojan:DOS/Alureon.J

The precise circumstances are unclear, but it's becoming obvious that MSE in some cases detects a DOS/Alureon.J infection where none exists

Apple Pay's security is impressive - but that won't stop the hackers trying

Few doubt Apple Pay will boost the market. But the stakes are rising too.

Why hackers may be stealing your credit card numbers for years

Hackers may have the upper hand for years as the retail industry slowly upgrades its systems, analysts said

Carriers' remote control software continues to put some mobile devices at risk

Security researchers have identified serious vulnerabilities in carrier-mandated remote management software installed on mobile devices

Why did Microsoft choose to put its cybersecurity accelerator in Israel?

Culture, the IDF and a proven track record

Check Point plots to disrupt threat intelligence market with new IntelliStore feeds

Is crowdsourcing for cash the next security gold?

Inside Facebook's brilliant plan to hog your data

Facebook's 'Anonymous Login' is about neither anonymity nor logging in. It's about creating scarcity in the market for user data

11 reasons encryption is (almost) dead

Massive leaps in computing power, hidden layers, hardware backdoors -- encrypting sensitive data from prying eyes is more precarious than ever

Drones, sensors and goals: How technology is changing the ‘beautiful game’

Goal-line technology has finally arrived - as well as drones - but what other innovations will the future hold?

The 7 deadly sins of startup security

Don't let security be an afterthought

Republican gains in Congress would have limited impact on big tech issues

Predicted Republican majorities in the House and Senate may not lead to big changes in net neutrality and other issues

Apple Pay probably secure from known NFC spoofing techniques

Apple's use of one-time-use tokens is the key

The BadUSB exploit is deadly, but few may be hit

It's a case of good news/bad news with the BadUSB firmware exploit

Likes of Apple Pay may make smaller banks more vulnerable

Many banks with less than $50 billion face a problem that payment systems like Apple Pay will make even more attractive to exploit

IDF 2014: Developers must address security and privacy concerns as IoT grows

Connected devices set to reach 50bn by 2020

Payment cards with chips aren't perfect, so encrypt everything, experts say

The EMV or 'chip-and-PIN' system is not without security flaws, researchers warned

7 tips for protecting your AWS cloud

Code Spaces was hacked and had to shut down - what can you learn from this?

Beware the next circle of hell: Unpatchable systems

Insecure by design and trusted by default, embedded systems present security concerns that could prove crippling

Six free network vulnerability scanners

You may not need to pay for expensive tools

Security-vendor snake oil: 7 promises that don't deliver

Beware bold promises from a multibillion-dollar industry that can't prevent your IT systems from being routinely hacked


Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map