Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

SECURITY

Features

Latest Security articles


Kaspersky's exploit-proof OS leaves security experts skeptical

Is it all a lot of hype or will Kaspersky's dream become a reality?

Embedded security no excuse for employee irresponsibility

Despite great strides being made with embedded security, the end user remains the week link

Do banks have what it takes to withstand DDoS attacks?

DDoS attacks are crude but effective

Flame malware server password cracked by Kaspersky researcher

Symantec said it tried to break the hash with brute force attacks but failed

NASA's CIO Adrian R. Gardner on managing cybersecurity challenges

The CIO at NASA's Goddard Space Flight Center looks to risk mitigation to manage cybersecurity challenges

Is Java now too dangerous to use?

Java is under fire once again. So why is everyone worried this time?

What to do when your PC is likely infected with malware

Perhaps you should try out a bootable malware scanner, which scan your hard drive outside of Windows

The 9 greatest IT security threats

Hacking has evolved from one-person crime of opportunity to an open market of sophisticated malware backed by crime syndicates and money launders

How did hackers bypass Apple to access an iCloud account?

Based on my experience with Apple support, that is not an easy thing to do

Mobile phones: security tokens for the next decade?

Mobile phones could replace hardware tokens over the next 10 years, if organistions are willing to accept them, says Entrust

Google Bouncer beaten at Black Hat 2012

Trustwave to show how it outwitted Google Play defense against Android malware; Stonesoft to air free 'Evader' detection tool

Dealing with key trends during an IT disaster recovery

Cloud services, virtualisation, BYOD and social CRM are key factors influencing disaster recovery

Will RIM survive the patent minefield?

The last thing the BlackBerry maker needs is a battle over patents with Mformation

Mobility, data harvesting are the biggest threats to security

IT managers should move into a position of understanding the natural state of their IT environment

New security threat at work: Bring-your-own-network

Education and contracts with employees can help curb security risks

What you need to know about Internet Explorer zero-day exploits

Expect an out-of-band patch as Microsoft deals with an actively exploited zero-day vulnerability

In depth: How Microsoft is taking down Nitol botnet

Microsoft discovered the infection on pristine personal computers in 2011 as it investigated supply chains in China

Is your ISP spying on you?

Here we check out just what exactly your ISP can see about you

How cybercriminals and hacktivists use DDoS tools to attack

Remote access, shell booters, low-orbit ion cannons - read all about it here

Six ways to protect against the new actively exploited Java vulnerability

Security researchers proposed several methods to protect computers from being compromised via a new Java vulnerability

Gauss malware - What you need to know

We answer some frequently asked questions about the Gauss virus

Defcon Wi-Fi hack called no threat to enterprise WLANs

Experts say attack against one part of Wi-Fi network security at Defcon will have zero impact on enterprise WLANS

Dangerous assumptions about clouds

Attorneys Christopher Wolf and Winston Maxwell debunk common assumptions about 'local clouds', the Patriot Act, and (many) governments' access to data

Blackhat SEOs and managing the Google threat

Many users have 'a relationship of convenience' with Google, but security must be aware of how services identify, track and profile users

Why employees shouldn't be trained for security awareness

Instead of spending resources on trying to teach employees to be secure, companies should focus on securing the environment and segmenting the network


Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map