Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

HACKER

Topic Zone

Latest News

Latest Features

  • A clear-eyed guide to Mac OS X's actual security risks

    Apple has improved its security in recent years, but is it enough?

  • 7 sneak attacks used by today's most devious hackers

    Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users

  • Planning for SDN

    Software-defined networking (SDN) is the hottest thing going today, but there is considerable confusion surrounding everything from the definition of the term to the different architectures and technologies suppliers are putting forward.

  • 7 sneak attacks used by today's most devious hackers

    Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users

  • True tales of (mostly) white-hat hacking

    Stings, penetration pwns, spy games -- it's all in a day's work along the thin gray line of IT security

  • AP Twitter hack prompts fresh look at cybersecurity needs

    Getting hacked on Twitter is fast becoming a rite of passage for big corporations, but Tuesday's attack on the Associated Press could be a tipping point and shows that social networks must do more to keep their users safe, security experts said.

  • 2012 - The year in quotes

    Some of the most memorable IT-related quotes were uttered in courtrooms this year, which involved a steady stream of legal challenges about intellectual property. In no particular order, these are some of the comments that stuck with us as 2012 winds to a close.

  • A year after DigiNotar security breach, Fox-IT details extent of compromise

    The 2011 security breach at Dutch certificate authority (CA) DigiNotar resulted in an extensive compromise and was facilitated in part by shortcomings in the company's network segmentation and firewall configuration, according to Fox-IT, the security company contracted by the Dutch government to investigate the incident.

  • Want a security pro? Get politically incorrect and understand geek culture

    While complaints can be heard far and wide that it's hard to find the right IT security experts to defend the nation's cyberspace, the real problem in hiring security professionals is the roadblocks put up by lawyers and human resources personnel and a complete lack of understanding of geek culture, says security consultant Winn Schwartau.

  • Is your smartphone spying on you?

    If you're paranoid that your phone is spying on you, don't watch Person of Interest, which highlights the many ways to hack, track, listen in on and use smartphones to monitor people, says Mike Elgan.





Featured White Papers

Phishing: The latest tactics and potential business impacts

As one of the top cybercrime ploys impacting both consumers and businesses, phishing has remained a consistently potent threat over the past several years. In fact, there was an average of over 37,000 phishing attacks each month in 2012.1 You no longer need to be a sophisticated hacker to commit fraud on the Internet. Anyone who is motivated can join in, thanks to the off-the-shelf phishing kits provided by a thriving cybercrime ecosystem. Download this white paper to discover how your organisation can successfully protect itself from advanced phishing attacks.
Download whitepaper

Shopping for a secure file transfer solution for retail

While security breaches have different causes ? external hacker breaches, insecure data transfer, and network security lapses ? they all have one thing in common: a too-casual approach to data protection.
Download whitepaper

When corporate network safety starts at employees' homes

A step-by-step guide to protecting your network against home wireless hackers and educating employees on the safe use of wireless home networks.
Download whitepaper

Software Common Hacks and Counterattacks

This white paper examines a variety of the most common hacking techniques, and the best counterattacks available for protecting your application from piracy.
Download whitepaper

Strengthening Network Security

Network security professionals are besieged by a nonstop flood of new software vulnerabilities, easy-to-get hacker toolkits, and an army of technology criminals eager to exploit network weaknesses for fun or profit.
Download whitepaper


Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map