Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

ANTIVIRUS

Topic Zone

Latest News

Latest Features

  • Security-vendor snake oil: 7 promises that don't deliver

    Beware bold promises from a multibillion-dollar industry that can't prevent your IT systems from being routinely hacked

  • A clear-eyed guide to Mac OS X's actual security risks

    Apple has improved its security in recent years, but is it enough?

  • Is rapid detection the new prevention?

    There's a trend underway in the information security field to shift from a prevention mentality--in which organisations try to make the perimeter impenetrable and avoid breaches--to a focus on rapid detection, where they can quickly identify and mitigate threats.

  • True tales of (mostly) white-hat hacking

    Stings, penetration pwns, spy games -- it's all in a day's work along the thin gray line of IT security

  • Spiceworks CEO sets sights on the enterprise

    Spiceworks, the social business platform for IT professionals, has announced its intention to become the online marketplace for business cloud services, as the platform continues to gain traction in the enterprise sector.

  • 12 personal security resolutions for 2013

    Among your typical New Year's resolutions - lose weight, stop smoking, be happier - you should consider making some pledges to better secure your digital life. You might even be healthier if you can prevent the stress of a digital disaster, like malware wiping out your PC, having your online accounts hacked, or becoming a victim of identify theft because of a phishing scam or data theft. With that in mind, here are some security resolutions you should consider for the new year.

  • Is this program malware or a false positive?

    Davikokar launched a program even though Norton warned that it was a Trojan. A subsequent hard drive scan revealed nothing bad. Davikokar then asked the Antivirus & Security Software forum if Norton had given a false positive?

  • Why isn't a program flagged as malware if it installs additional, unwanted software?

    The iLivid installation routine put several unwanted programs on Threaddy's computer. Why didn't Norton block the program as malware?

  • Which smartphone is the most secure?

    These days, it is almost impossible to meet someone who doesn't own a cell phone. More specifically, smartphones, whether it be the trendy iPhone, corporate favored Blackberry or modern Windows Mobile, almost everyone has joined the smartphone frenzy - and with good reason. A smartphone offers more advanced computing ability and connectivity than a contemporary phone.

  • Year of mobility ? IT leaders reveal annual benefits

    2012 is emerging as the pivotal year when global sales of mobile devices - including smartphones and tablets ? are widely predicted to overtake PCs in terms of both shipments and spending. And it is clear that the mobile working revolution is delivering compelling business benefits to a wide variety of UK and European companies.





Featured White Papers

ESET NOD32 Antivirus Makes the Grade at Brighton College

Ensuring that computers remain virus free when they are used by hundreds of children everyday to surf the web, collect email and plug-in a myriad of storage devices is just the sort of challenge that has given ESET NOD32 its enviable reputation. Download this case study to discover more.
Download whitepaper

MSQ Partners antivirus case study

With cyber threats becoming more prolific to enterprises, antivirus software has become a necessity. Protecting your organisation from malware, adware, suspicious files and behaviour, and unauthorised software whilst maintaining streamlined operations is essential. Download this case study to see how MSQ Partners utilised antivirus software to protect themselves from cyber attack and learn how your organisation can do the same.
Download whitepaper

A secure hybrid cloud for all

Security has always been one of the key elements of any IT organisation. For everything from antivirus and anti-malware protection to web and e-mail security, companies have to provide adequate protection. However with the rise in virtualisation and cloud computing, new and different security challenges emerge which cannot be met with traditional perimeter concepts. Download this white paper to discover how your organisation can protect physical, virtual, and cloud-based systems using an agentless virtual appliance.
Download whitepaper

Using defense-in-depth to combat endpoint Malware

The signature-based model of classic antivirus (AV) and the teams and infrastructure behind it are increasingly stretched to keep up with the pace and sophistication of today's financially motivated malware developers.
Download whitepaper

How to protect your business from the coming Malware storm

This paper describes the evolution and future of the online threat environment, and outlines the security, economy, performance, and control available to smaller businesses who act now to adopt Security as a Service.
Download whitepaper


Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map