Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

COMPUTER VIRUS

Topic Zone

Latest News

Latest Features

  • Who's to blame for 'catastrophic' Heartbleed Bug?

    The Heartbleed Bug, basically a flaw in OpenSSL that would let savvy attackers eavesdrop on Web, e-mail and some VPN communications that use OpenSSL, has sent companies scurrying to patch servers and change digital encryption certificates and users to change their passwords. .

  • True tales of (mostly) white-hat hacking

    Stings, penetration pwns, spy games -- it's all in a day's work along the thin gray line of IT security

  • The hidden dark side of today's hottest tech trends

    New technologies and new IT strategies are here to solve all your problems -- except the ones they create

  • Which smartphone is the most secure?

    These days, it is almost impossible to meet someone who doesn't own a cell phone. More specifically, smartphones, whether it be the trendy iPhone, corporate favored Blackberry or modern Windows Mobile, almost everyone has joined the smartphone frenzy - and with good reason. A smartphone offers more advanced computing ability and connectivity than a contemporary phone.

  • The 9 greatest IT security threats

    Hacking has evolved from one-person crime of opportunity to an open market of sophisticated malware backed by crime syndicates and money launders

  • Gauss malware - What you need to know

    Another day, another scary computer virus tearing through the Middle East. The latest piece of malware is called Gauss, and it's designed to steal bank account credentials while gathering as much information about the infected machines as possible.

  • Dangerous assumptions about clouds

    No one is more vigilant about protecting the data of EU citizens than European Commission Vice-President Viviane Reding. She is spearheading and vigorously advocating for the Commission's proposals to update and modernize the privacy framework in Europe through a detailed new Regulation. She worries a lot about the privacy and security of EU citizens' data. And she can be a tough critic of the US privacy protection framework.

  • Gatekeeper: Apple's answer to validity checks on OS X

    Out of the blue, Apple just announced Mountain Lion, the next generation of its OS X operating system. By the time Mountain Lion ships sometime next summer, Apple says it will have lots of new features, some transported from its iOS environment of the iPhone, iPad and iPod Touch world. This column will examine just one of the new features, one that, while good, has not yet included all the functions of its iOS prototype.

  • A simple guide to Deep Packet Inspection

    Most of us don't visit websites suspected of illegally distributing copyrighted material, so blocking us from accessing them seems harmless. But should your ISP ever be legally obligated to prevent you from accessing restricted websites, it will have to find a way to monitor your online activity, and that could cause your privacy to be compromised if your ISP employs deep packet inspection tools to keep tabs on you.

  • Do you know your cyberthreat terms?

    The watchdogs at the Government Accountability Office this week issued a report that takes a look at what information, or guidance as they call it, is available to help government agencies and public sector companies bulk up their cybersecurity efforts.





Featured White Papers

Think your anti-virus software is working? Think again

We've been so bombarded by computer viruses, worms, Trojan horses and other malware that we have become acclimated to their presence. We subscribe to an anti-virus (AV) offering and hope for the best. Trouble is, AV has not been keeping up. Studies show that even though most organisations use AV, more and more are succumbing to attacks.
Download whitepaper

Executive Guide to Internal Data Theft

Despite more security issues than ever all competing for organizations' attention, the seemingly unstoppable rise in the use of portable storage devices in the workplace is a risk that needs urgent action. This C-Level guide highlights the main risk to the organization and what can be done to combat internal data theft.
Download whitepaper

The Economics of Computer Hacking

This paper considers various classes of computer hackers, with a special emphasis on fame-driven versus profit-driven hackers. We use simple economic analysis to examine how each of these hacking ?markets? work. The resulting framework is employed to evaluate current U.S. policy aimed at reducing the threat of computer hacking and shows that this policy is largely effective.
Download whitepaper

Gone in sixty seconds

The only way organizations can be sure that unauthorized devices are not being used to remove sensitive files from the network is to electronically intercept those devices as they are connected to work PCs, automatically verifying the security rights of the user and instantly allowing or blocking the attempted data transfer accordingly, finally creating a permanent record of the connection.
Download whitepaper

The Economics of Computer Hacking

This paper considers various classes of computer hackers, with a special emphasis on fame-driven versus profit-driven hackers. We use simple economic analysis to examine how each of these hacking ?markets? work. The resulting framework is employed to evaluate current U.S. policy aimed at reducing the threat of computer hacking and shows that this policy is largely effective.
Download whitepaper


Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map