Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

EMAIL ADDRESS

Topic Zone

Latest News

Latest Features

  • 7 sneak attacks used by today's most devious hackers

    Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users

  • 7 sneak attacks used by today's most devious hackers

    Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users

  • True tales of (mostly) white-hat hacking

    Stings, penetration pwns, spy games -- it's all in a day's work along the thin gray line of IT security

  • So, a comic walks into a tech convention

    Go to a technology event or corporate meeting these days and you're bound to hear from a guest speaker. It's often someone like a retired politician telling war stories, or a new-age management guru delivering a thinly veiled pitch for their latest book.

  • National Rail Enquiries CEO makes the case for multi-sourcing

    National Rail Enquiries is one of the most popular websites in the UK, providing customers with a journey planning service, live train information and detailed information about the rail industry, including service disruption and station facilities information.

  • Evernote breached ? should admins be worried?

    It?s the email every Internet business dreads having to compose to its customers but last weekend Evernote became only the latest of a long list of big brands that found itself reluctantly hitting the ?send? button.

  • Long live the 'secure breach' era

    Every defense paradigm has a finite life span and the IT industry's breach prevention paradigm, which is based on perimeter technology designed to keep the bad guys out, is completely out of step with today's threat landscape. It's time to move on to a new era: the "secure breach" era.

  • 10 ways to get the most from your Wi-Fi-only tablet

    Much to the chagrin (and much against the ill wishes) of wireless carriers such as AT&T, Verizon, Sprint, and T-Mobile, people are buying Wi-Fi-only tablets. In fact, some studies have shown that in 2011 up to 90 percent of all tablets sold in the United States relied on Wi-Fi, rather than on 3G or 4G LTE.

  • How did hackers bypass Apple to access an iCloud account?

    It's incredibly difficult to get back into your own iCloud account or any other Apple services if you forget the password somehow, so how on earth did the hackers manage it?

  • Are you using your big data right?

    Big Data promises a far greater degree of personalisation and targeting when marketing to customers, but collecting that data can be like handling a live wire: You can wind up having a real bad day if you don't treat it with respect.





Featured White Papers

Free Practical Do's and Don'ts Guide to Spam

Spammers have many ways of collecting and identifying email addresses ? from harvesting them and buying them, to launching dictionary style attacks. It may never be possible to hide from the spammers completely, but read these free tips that every email user can use to try and guard their email address and subsequently their inbox.
Download whitepaper

Save Yourself from Eternal Spamnation

This paper seeks to provide everything you need to know about spam ? its various types, origins, mechanisms and problems, as well as information about spammers? tricks and an update on the legal issues involved.
Download whitepaper

Managing Customer Emails

It?s hard not to offer an email customer service option if you have a website. It?s like a a brick-and-mortar business not providing a phone number for customer service! If you feature an email address on your website, customers will find and use it.
Download whitepaper

?Do you want spam with that spam??

October marks the beginning of the spam season this year in the run up to the holiday period, with MessageLabs seeing a sharp increase in levels this month, especially in the past few weeks. As predicted in the September/Q3 MessageLabs Intelligence report, spam is not going away. This increase is largely attributed to the huge rise in botnet activity over the past few weeks.
Download whitepaper

Q2 2005 Virus Roundup

Significant malware for the period of May to June 2005 include: the breakthrough bot worm family, WORM_MYTOB, which caused more than half of midyear alerts; a ?sobering? worm making a comeback; an ambiguous partnership between a worm and a spyware; and a malware team-up furthering the trend set by recent outbreak worms. The second quarter of 2005 saw the reemergence of WORM_MYTOB variants from dormancy. Employing new social engineering techniques, MYTOB took center stage with more crafty and concise email attachments. This bot worm raised 4 alerts from May 9 to June 3, 2005.
Download whitepaper


Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map