Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Blogs

War on Error

by John E Dunn

One day they'll laugh at what we think is secure. Thankfully, we won't be there to hear them...

Posts

China's 'knock-off' J-31 fighter - cyberwar spoils or an an example of its self-deception?

November, 17 2014 01:54 PM

China's 'knock-off' J-31 fighter - cyberwar spoils or an an example of its self-deception?

The Chinese Government has been accused of numerous military-industrial cyber-attacks against the US, the direct effects of which are almost impossible to gauge. The troubled case of China’s J-31 'Shenyang' stealth fighter, formally unveiled at the Zhuhai Air Show last week, might turn out to be a fascinating exception to this rule.

'Malvertising' research blog pulled after ad network objects to methodology

November, 14 2014 05:40 PM

'Malvertising' research blog pulled after ad network objects to methodology

Earlier this week security startup Lastline pulled a blog outlining malvertising research it did into the ‘Top 10 dirtiest ad networks’ after one or more of those mentioned objected to the firm’s methodology.

Anti-virus is no longer enough - new apps show how vulnerability scanning is becoming a must

October, 29 2014 02:24 PM

Anti-virus is no longer enough - new apps show how vulnerability scanning is becoming a must

It has taken a long time, but slowly and surely computer security has reached the moment where it moves away from simply securing a device from specific threats to one in which more attention is paid to its everyday security state.

PwC reports finds security spending is falling – isn’t this what security vendors promised?

October, 01 2014 12:44 PM

PwC reports finds security spending is falling – isn’t this what security vendors promised?

Nothing gets a rise out of security vendors like a good story about under-investment and spending cuts by the very enterprises that a hundred headlines a week tell us are being plundered by cyber-criminals at will.

Bash 'shellshock' flaw is serious because fixing it will depend on manual intervention

September, 25 2014 01:42 PM

Bash 'shellshock' flaw is serious because fixing it will depend on manual intervention

Sometimes security makes you feel tired. Less than six months after Heartbleed, the security industry now has had the potentially even more serious Bash or ‘Shellshock’ CVE-2014-6271 flaw dumped in its lap. Exactly how serious is open to some interpretation but everyone seems to agree on one thing – this one won’t be easy to fix.

Home Depot BlackPOS attack driven by criminal cyberwarfare

September, 08 2014 01:30 PM

Home Depot BlackPOS attack driven by criminal cyberwarfare

A new variant of the BlackPOS malware reportedly used to infect Home Depot cash tills is connected to a Russian group that left evidence of its strong anti-American world view buried inside the code, security blogger Brian Krebs has discovered.

HP's Stream laptop shows how confused Microsoft is about cloud computing

August, 19 2014 05:05 PM

HP's Stream laptop shows how confused Microsoft is about cloud computing

Plausible anti-Chromebook fightback or Microsoft throwing oranges at a gorilla? HP has called it the Stream and it’s the first model of what Microsoft hopes will grow into a low-cost notebook niche to take on the Chromebooks that have,...

The NCA has another go at cybercrime 'awareness'. Is anyone listening?

August, 13 2014 12:25 PM

The NCA has another go at cybercrime 'awareness'. Is anyone listening?

Britain's security mandarins are going through the motions. Awareness is not going to dent an issue while the technology is at fault Four in ten UK computer users still don’t install security software on PCs or mobile devices despite the...

SynoLocker NAS ransomware - was February 'PWNED' attack a warning of trouble?

August, 06 2014 02:18 PM

SynoLocker NAS ransomware - was February 'PWNED' attack a warning of trouble?

SynoLocker was not the first malware to target a serious software vulnerability in DiskStation software Could the unprecedented attack on users of Synology’s DiskStation NAS storage drives by ransom malware have been stopped before it...

Google's Project Zero flaw programme - do-gooding spin or a much-needed evolution?

July, 16 2014 04:46 PM

Google's Project Zero flaw programme - do-gooding spin or a much-needed evolution?

It turns out that flaw bounties won't do it on their own. Google is the first to realise this. Germany had its post-WW2 Year Zero, New York has Ground Zero and now Google has added its name to the list with Project Zero, a crack security team the...

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map

* *