Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message



Latest Security articles

LulzSec bust a blow to Anonymous? Not so fast

'Anonymous a handful of geniuses surrounded by a legion of idiots'

Is Google actually evil?

Few tech company names ever become common English terms. No one ever asks you to "Microsoft" a document or "Apple" a video.

How to sneak into the RSA security conference

No badge? No problem.

Five free Android security apps tried and tested

Because of the openness of Android, the Google OS can be an easy target for malware writers and cybercriminals

Internet Doomsday March 8 - The truth about DNSChanger viruses

While it's true some users may lose their internet access next month, it's not the FBI's fault

The 15 worst data security breaches of the 21st century

Security practitioners weigh in on the 15 worst data security breaches in recent memory

Six ways to prevent drive-by download malware attacks

Help users protect themselves against virus assault

How to protect intellectual property in the cloud

Before signing up for cloud services, make sure your IP is adequately protected with the right provider

A simple guide to Deep Packet Inspection

How your ISP can keep an eye on what you do online

Five ways to secure your office email

Simple tips to stop snoopers accessing your business communications

Lessons from history: The first virus

Remember The Brain?

Online shoe retailer Zappos hacked: What we can learn from this has revealed that attackers have compromised information of its 24 million customers

Are we actively encouraging destructive hacking?

Facebook's latest Hacker Cup celebrates creative computer talent instead of rewarding the destroyers, which is rare

A $500,000 bet on Internet security

The vulnerabilities of cloud computing stem from the threats lurking within the public Internet itself

HP Software CTO: brokers will spur cloud adoption

The cloud brokerage model simplifies the management challenge for end users, says Ken O'Hagan

Gatekeeper: Apple's answer to validity checks on OS X

Gatekeeper does the same validity check as the iOS system but only does it when an app is first installed

When is a cybercrime an act of cyberwar?

With no consensus on clearly defining the terms, it's easy to get confused by the array of labels available for cyber attacks

How Google got around Apple's Safari privacy protection

The search giant has been caught dropping cookies where it shouldn't

Self-signed SSL certificates can be secure

The problem with trusting vendors over your own authority

Know your Internet bad guys

TrendMicro's handy infographic gives you the low-down on web enemies

Protecting your organisation's intellectual property

Cyber espionage is becoming a big threat - how well do you protect your company's intellectual property?

Google privacy policy letter to Congress - Five key points

We break down Google's explanations to the changes it plans to implement in its privacy policies

Six security companies you should watch

Check out the hot six up-and-coming security companies in the industy

Will 2012 be the dawn of DNSSEC?

Cybersecurity experts are urging IT departments to invest in DNSSEC before a high-profile attack occurs

Cybersecurity help exists, if you know where to look

There are many international groups offer guidelines and technical security techniques for maintaining the confidentiality of data

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map