Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message


Topic Zone

Latest News

Latest Features

  • Who's to blame for 'catastrophic' Heartbleed Bug?

    The Heartbleed Bug, basically a flaw in OpenSSL that would let savvy attackers eavesdrop on Web, e-mail and some VPN communications that use OpenSSL, has sent companies scurrying to patch servers and change digital encryption certificates and users to change their passwords. .

  • AP Twitter hack prompts fresh look at cybersecurity needs

    Getting hacked on Twitter is fast becoming a rite of passage for big corporations, but Tuesday's attack on the Associated Press could be a tipping point and shows that social networks must do more to keep their users safe, security experts said.

  • 12 personal security resolutions for 2013

    Among your typical New Year's resolutions - lose weight, stop smoking, be happier - you should consider making some pledges to better secure your digital life. You might even be healthier if you can prevent the stress of a digital disaster, like malware wiping out your PC, having your online accounts hacked, or becoming a victim of identify theft because of a phishing scam or data theft. With that in mind, here are some security resolutions you should consider for the new year.

  • Securing the Internet of Things

    Some of the world?s most successful IT companies believe that Machine-to-Machine computing, the Internet of Things, will propel them to new heights.

  • Do banks have what it takes to withstand DDoS attacks?

    As with Tuesday's attack on Wells Fargo, distributed denial of service attacks are said to be still crude but effective

  • The worst security muddles (so far) of 2012

    From the embarrassing hack of a conversation between the FBI and Scotland Yard to a plethora of data breaches (think LinkedIn, eHarmony, Elantis, VMWare), security muddles have ruled the first half of 2012.

  • Spammers staying ahead of filters and law enforcement

    When Microsoft slayed the notorious botnet Rustock, which had been sending as much as 40% of all spam worldwide, in March 2011, it forced the volume of spam into a decline from which it has never fully recovered.

  • A $500,000 bet on Internet security

    Longtime cloud security advocate Philippe Courtot believes he has identified the Achilles' heel of cloud security, and he wants to protect it.

  • Are we actively encouraging destructive hacking?

    People seem to think that organising teams of people to hack into systems is a way to bring together the best computer talent to square off against each other. I look at it as a waste of that talent.

  • Internet Explorer silent updates are not a miracle cure

    Microsoft made waves this week by announcing that it plans to implement automatic, silent updates to push the latest version of Internet Explorer. If you were hoping that silent updates will finally nail the coffin on IE6 and IE7, though, don?t hold your breath.

Featured White Papers

Gen Y professionals exposing workplaces to cyber attack

Low cyber-threat awareness amongst Gen-Y professionals coupled with blasé attitudes towards cyber security are leaving organisations across the country exposed to attack and data leaks according to new research commissioned by Internet security company ESET. Thirty-eight percent of Gen-Y professionals, those aged 18 to 30 years old, are unaware of, or don?t believe, their company has an IT security policy, whilst a further 30 percent of those who are aware of the existence of an IT security policy do not know what it is. Half also believe it?s nearly always their organisation?s sole responsibility to ensure the safety of data. Download this white paper to understand how you can protect your business in the BYOD boom.
Download whitepaper

Internet security threat report 2014

In 2013 much attention was focused on cyber-espionage, threats to privacy and the acts of malicious insiders. However the end of 2013 provided a painful reminder that cyber crime remains prevalent and that damaging threats from cyber criminals continue to loom over businesses and consumers. Eight breaches in 2013 each exposed greater than 10 million identities, targeted attacks increased and end-user attitudes towards social media and mobile devices resulted in wild scams and laid a foundation for major problems for end users and businesses as these devices come to dominate our lives. Download this white paper to discover the main security concerns facing IT over the coming months.
Download whitepaper

Internet security threat report

Threats to online security have grown and evolved considerably in 2012. From the threats of cyber espionage to widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. Download this white paper to see how innovations in data security can help protect your company.
Download whitepaper

Converged threats

This White Paper examines converged threats and highlights the need to choose a joined-up solution crucial to delivering the Converged Threat Protection that can outfox and outflank attacks which have raised the stakes in the field of internet security.
Download whitepaper

Symantec Enterprise Security Framework

For IT security professionals today the pace of change has accelerated dramatically. The current Internet security threat landscape continues to evolve in both volume and complexity of attacks. At the same time, trends such as virtualization, cloud computing and the use of consumer mobile devices raise new issues for security. Meanwhile, slow business growth and tight budgets mean IT security must do more with less.
Download whitepaper

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map