Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message


Topic Zone

Latest News

  • Foxit Reader update stops PDF attack

    Foxit Software, the developer of a rival PDF viewer to Adobe's vulnerability-plagued Reader, released an update today that blocks some attacks with a "safe mode" that's switched on by default.

  • Adobe PDF unfixed flaw exploited by hackers

    Several security companies warned of a major malware campaign that tries to dupe users into opening rigged PDFs that exploit an unpatched design flaw in the format

  • Microsoft patches critical code library flaw

    Microsoft has wrapped up a months-long job of patching a critical bug it accidentally introduced in a crucial code "library," one of the researchers who uncovered the flaw said today.

  • The Internet is the new Wild West reports IBM consultant

    "The Internet has finally taken on the characteristics of the Wild West where no one is to be trusted," said Sukhdev Singh, senior security consultant and regional X-Force expert, IBM Internet security systems, IBM ASEAN.

  • Phishing attacks down in 2009

    Spam-based phishing attacks declined noticeably during the first half of the year according to IBM

  • ATM vendor threatens security firm over flaw

    A security researcher has been barred from making a presentation on security flaws in bank cash machines after an ATM vendore threatened legal action.

  • Adobe begins patching cycle with 13 critical fixes

    Adobe has begun its first regularly-scheduled security update, after issuing patches to fix at least 13 critical flaws with Acrobat and Reader.

  • Image spam makes a comeback

    Spammers have turned back the clock and are recycling a years-old tactic by planting their messages in images, according to a security researcher.

  • Vendor gets cold feet about revealing software flaw

    Researchers have pulled out of a presentation which was expected to reveal details of a major security vulnerability, citing concerns that hackers could exploit the flaw.

  • Experts bicker over Conficker numbers

    Security experts say that the Conficker worm has infected an awful lot of computers, making it the largest "botnet" of hacked computers on the planet. The thing they can't seem to agree on, however, is exactly how many people have been hit.

Latest Features

Featured White Papers

Protect your business with a security and compliance solution for financial services and organizations from IBM

It?s a disaster waiting to happen. At the same time that financial services organizations are becoming more reliant on Web technology to deliver innovative features and services to their customers, hackers are increasingly targeting Web applications. According to a recent IBM Internet Security Systems X-Force® research and development team report, 50.4 percent of all vulnerabilities disclosed so far in 2009 are Web application vulnerabilities. Undetected vulnerabilities in Web applications or Web services can leave organizations at risk of security breaches from external or even internal sources.
Download whitepaper

FISMA Compliance

This white paper provides an overview of the Federal Information Security Management Act legislation and discusses how ISS strategic approach to developing and maintaining an enterprise-wide security infrastructure best addresses FISMA requirements and continuous security improvements.
Download whitepaper

Internet Security Systems: Web-based session management is critical

The likelihood of an attacker specifically targeting the Web session management process is increasing. This White Paper examines the issues required to assess and implement good session management.
Download whitepaper

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map