Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

SECURITY

Features

Latest Security articles


Who's to blame for 'catastrophic' Heartbleed Bug?

Mixed response to questions it poses about open source community's validation process

The Open Source Rookies of the Year Awards

Black Duck picks the top 10 open source projects launched in the past year.

7 sneak attacks used by today's most devious hackers

Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users

Our Internet privacy is at risk -- but not dead (yet)

Legislation, stealth technologies, and emerging data privacy markets are proving that the battle for our Net privacy has only just begun

Big Data jumps to the cloud

When Dell sidesteps internal compute power, you know something is going on

Infosec 2013: managing risk in the supply chain

Locking down contracts and auditing are absolutely key, say security experts

Our Internet privacy is at risk -- but not dead (yet)

Legislation, stealth technologies, and emerging data privacy markets are proving that the battle for our Internet privacy has only just begun

DDoS attack against Spamhaus was reportedly the largest in history

The attack caused problems for the global Internet

MWC: Device vendors muscle in on lucrative MDM market

Samsung KNOX and BlackBerry BES and Balance prepare for battle. May the best cross-platform solution win

Facebook Graph Search a great tool for phishing attacks

Graph Search makes it easier for cyber criminals to gather relevant details that can be used to target phishing attacks more effectively

Top security threats in 2013: Mobile attacks

Mobile worms that buy malware from app stores, ransomware

Is this program malware or a false positive?

What can you do if your antivirus software (in this case Norton) identifies a program as a Trojan, but you're pretty sure it's not?

Why isn't a program flagged as malware if it installs additional, unwanted software?

The iLivid installation routine put several unwanted programs on Threaddy's computer. Why didn't Norton block the program as malware?

A clear-eyed guide to Mac OS X's actual security risks

Apple has improved its security in recent years, but is it enough?

Is rapid detection the new prevention?

The perimiter is porous, making risk mitigation essential

7 sneak attacks used by today's most devious hackers

Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users

True tales of (mostly) white-hat hacking

Stings, penetration pwns, spy games -- it's all in a day's work along the thin gray line of IT security

Spy-proof enterprise encryption is possible, but daunting

Privacy concerns are top of mind in light of revelations about NSA data collection

AP Twitter hack prompts fresh look at cybersecurity needs

Two-step identity verification and analysis of user trends could prevent future attacks, experts say

Why software-defined security is essential in a virtualised environment

Not much is happening on the physical network any more

Evernote breached – should admins be worried?

Admins can manage Evernote-like applications but never fully control them

Kim Dotcom talks security and privacy at Mega launch

A look at some of the key points made by Dotcom during the press conference at his mansion

Privilege management could cut breaches - if it were used

Least privilege management has still not gone mainstream

12 personal security resolutions for 2013

From Wi-Fi to mobile security, here are 11 things you should commit to doing this year to keep hackers and malware at bay.

You can lock your flash drives for free in Windows 8 with BitLocker

How Windows 8 Professional and Enterprise users should encrypt their external drives—for free.


Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map