Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

SECURITY

Features

Latest Security articles


Facebook Graph Search a great tool for phishing attacks

Graph Search makes it easier for cyber criminals to gather relevant details that can be used to target phishing attacks more effectively

Top security threats in 2013: Mobile attacks

Mobile worms that buy malware from app stores, ransomware

Is this program malware or a false positive?

What can you do if your antivirus software (in this case Norton) identifies a program as a Trojan, but you're pretty sure it's not?

Why isn't a program flagged as malware if it installs additional, unwanted software?

The iLivid installation routine put several unwanted programs on Threaddy's computer. Why didn't Norton block the program as malware?

Processor-level security is no panacea, but it is a big step forward

Security built in at the level of microprocessors is finally starting to look like a viable layer of defence

Information security: Seeking Sun Tzu's guidance

There is a war to prepare for - a cyberwar. Sun Tzu's Art of War offers much guidance

Dell software chief: why hardware is no longer enough

Hardware giant sets its sights on systems management, security software and business intelligence

Cloud contracts - Nine security controls to look for

Gartner says cloud SLAs are 'weak but improving' - but just how effective are those controls?

A year after DigiNotar security breach, Fox-IT details extent of compromise

The hacker gained admin access to all critical DigiNotar certificate authority systems despite network segmentation, investigators say

Windows 8 security focuses on early malware detection

Security experts say Windows 8 is the most secure Microsoft OS to date, but that doesn't mean malware won't evolve to exploit it

Kaspersky's exploit-proof OS leaves security experts skeptical

Is it all a lot of hype or will Kaspersky's dream become a reality?

Embedded security no excuse for employee irresponsibility

Despite great strides being made with embedded security, the end user remains the week link

Do banks have what it takes to withstand DDoS attacks?

DDoS attacks are crude but effective

Privilege management could cut breaches - if it were used

Least privilege management has still not gone mainstream

12 personal security resolutions for 2013

From Wi-Fi to mobile security, here are 11 things you should commit to doing this year to keep hackers and malware at bay.

You can lock your flash drives for free in Windows 8 with BitLocker

How Windows 8 Professional and Enterprise users should encrypt their external drives—for free.

Standardising cloud encryption is key to improving security

The first problem that we lawyers have when we hear "data" and "cloud" used in the same sentence is that data is valuable, and the cloud concentrates that value

Consumerisation doesn't have to impact on security

The relevant technologies and tools are available to enable your staff to do their jobs without compromising corporate data

SSL decryption necessary for security, but employees might 'freak out'

At Palo Alto Networks conference, one security expert explains why

Ernst & Young: using forensic analytics to prevent fraud

Taking a proactive approach to fraud detection can help firms protect their money and reputation

Which smartphone is the most secure?

There are unique differences and threats specific to each smartphone - so which is the best?

Long live the 'secure breach' era

Breach prevention is dead.

BYOD, cloud security conerns make military and intelligence agencies hesitate

US national security doesn't like the word "BYOD" and are mostly BlackBerry users still

Mobility, data harvesting are the biggest threats to security

IT managers should move into a position of understanding the natural state of their IT environment

New security threat at work: Bring-your-own-network

Education and contracts with employees can help curb security risks


Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map