Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

EMAIL ADDRESS

Topic Zone

Latest News

Latest Features

  • Inside Facebook's brilliant plan to hog your data

    Companies want to get information about people -- their location, age, relationships, interests, preferences and much more -- because when they have that information they can offer more powerful, more monetizable apps and services and can make money with high-priced personalized ads.

  • 7 sneak attacks used by today's most devious hackers

    Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users

  • 7 sneak attacks used by today's most devious hackers

    Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users

  • True tales of (mostly) white-hat hacking

    Stings, penetration pwns, spy games -- it's all in a day's work along the thin gray line of IT security

  • So, a comic walks into a tech convention

    Go to a technology event or corporate meeting these days and you're bound to hear from a guest speaker. It's often someone like a retired politician telling war stories, or a new-age management guru delivering a thinly veiled pitch for their latest book.

  • National Rail Enquiries CEO makes the case for multi-sourcing

    National Rail Enquiries is one of the most popular websites in the UK, providing customers with a journey planning service, live train information and detailed information about the rail industry, including service disruption and station facilities information.

  • Evernote breached ? should admins be worried?

    It?s the email every Internet business dreads having to compose to its customers but last weekend Evernote became only the latest of a long list of big brands that found itself reluctantly hitting the ?send? button.

  • Long live the 'secure breach' era

    Every defense paradigm has a finite life span and the IT industry's breach prevention paradigm, which is based on perimeter technology designed to keep the bad guys out, is completely out of step with today's threat landscape. It's time to move on to a new era: the "secure breach" era.

  • 10 ways to get the most from your Wi-Fi-only tablet

    Much to the chagrin (and much against the ill wishes) of wireless carriers such as AT&T, Verizon, Sprint, and T-Mobile, people are buying Wi-Fi-only tablets. In fact, some studies have shown that in 2011 up to 90 percent of all tablets sold in the United States relied on Wi-Fi, rather than on 3G or 4G LTE.

  • How did hackers bypass Apple to access an iCloud account?

    It's incredibly difficult to get back into your own iCloud account or any other Apple services if you forget the password somehow, so how on earth did the hackers manage it?





Featured White Papers

Protect against targeted attacks with security intelligence

Targeted attacks are the new frontier for security professionals and show the increasing sophistication of cyber criminals. They are multilayered attacks that require structured research by cyber criminals about their potential victims, such as finding out their email addresses, job titles and job functions, areas of interest, websites they frequently access, conferences they attend and so on. Once the research is done, cyber criminals choose the path of least resistance and attack employees in companies that are not well protected through security systems. Download this white paper to discover how your organisation can protect itself against targeted attacks with security intelligence.
Download whitepaper

Free Practical Do's and Don'ts Guide to Spam

Spammers have many ways of collecting and identifying email addresses ? from harvesting them and buying them, to launching dictionary style attacks. It may never be possible to hide from the spammers completely, but read these free tips that every email user can use to try and guard their email address and subsequently their inbox.
Download whitepaper

Save Yourself from Eternal Spamnation

This paper seeks to provide everything you need to know about spam ? its various types, origins, mechanisms and problems, as well as information about spammers? tricks and an update on the legal issues involved.
Download whitepaper

Managing Customer Emails

It?s hard not to offer an email customer service option if you have a website. It?s like a a brick-and-mortar business not providing a phone number for customer service! If you feature an email address on your website, customers will find and use it.
Download whitepaper

?Do you want spam with that spam??

October marks the beginning of the spam season this year in the run up to the holiday period, with MessageLabs seeing a sharp increase in levels this month, especially in the past few weeks. As predicted in the September/Q3 MessageLabs Intelligence report, spam is not going away. This increase is largely attributed to the huge rise in botnet activity over the past few weeks.
Download whitepaper


Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map