Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message


Topic Zone

Latest News

Latest Features

  • A clear-eyed guide to Mac OS X's actual security risks

    Apple has improved its security in recent years, but is it enough?

  • Is your smartphone spying on you?

    If you're paranoid that your phone is spying on you, don't watch Person of Interest, which highlights the many ways to hack, track, listen in on and use smartphones to monitor people, says Mike Elgan.

  • Windows 8 security - What's new in latest operating system

    Windows 8 will be released later this year, and the new Start screen and Metro-style apps will likely be the first changes you'll notice, but those aren't the only things that are new. Microsoft is also making some serious security enhancements to help keep your system safer and to improve Windows' ability to combat viruses and malware. It just may be the biggest improvement to Windows security yet.

  • Mobile device management - Tools and technologies for the BYOD era

    Mobile Device Management (MDM) is an increasingly important IT management discipline, particularly with the rise in mobile working and the Bring Your Own Device (BYOD) phenomenon.

  • The 15 worst data security breaches of the 21st century

    Data security breaches happen daily in too many places at once to keep count. But what constitutes a huge breach versus a small one? For some perspective, we take a look at 15 of the biggest incidents in recent memory. Helping us out are security practitioners from a variety of industries, including more than a dozen members of LinkedIn's Information Security Community, who provided nominations for the list.

  • Six ways to prevent drive-by download malware attacks

    In the first quarter of 2011, enterprise users encountered an average of 274 web-based malware attacks, a 103 percent increase over 2010, according to research from Cisco ScanSafe. Why the dramatic increase? One major cause is the growing number of drive-by download attacks. Drive-by downloads are an especially pernicious method cybercriminals use to install viruses and spyware, and otherwise take control of unsuspecting end users' computers.

  • The worst Internet privacy scandals of all time

    In honour of National Data Privacy Day, we've put together a list of the 15 worst Internet privacy scandals of all time.

  • From the horse's mouth: 5 things you should know about Carrier IQ

    Mobile device and network diagnostic firm Carrier IQ early Tuesday issued a detailed report about what it is up to with your smartphone data. The company has been under fire ever since Trevor Eckhart discovered CIQ software working behind the scenes on a variety of smartphones. Eckhart originally accused CIQ of installing malware on people's phones and monitoring users' key presses, SMS messages, location data and web browsing history.

  • Mobile spyware raises ethical and legal questions

    In 2003, Atir Raihan began work on a product that has gone on to gain infamy in the world's security industry. His idea: to build a spyware program for mobile phones that would allow people to catch a cheating spouse.

  • Eleven free security and privacy protection programs

    Want to ensure that your PC and all of your files and data stay safe, secure and private without breaking the bank?

Featured White Papers

Encryption and data protection

Every day, more than 75 billion legitimate personal and business emails are exchanged globally, yet only a tiny fraction are encrypted. In a world where leaked emails, spyware and data theft can cost companies millions.
Download whitepaper

Moving targets

It?s often said that businesses need to think global. But now an even bigger priority is to think mobile. Because the whole concept of business ? how it?s done, when it?s done, where it?s done ? is changing radically.
Download whitepaper

Understanding the risks of mobile applications

Mobile applications may have several types of security risk: language inherent risk, based on common security flaws in the language; malicious data exfiltration, in which sensitive data is surreptitiously transmitted from the phone; and platform specific risk, based on specific vulnerabilities inherent in the mobile platform.
Download whitepaper

Why Security SaaS Makes Sense Today

This white paper explains seven reasons to adopt SaaS Security and how to stop attacks via the Web and through email.
Download whitepaper

Spyware: A morphing campaign

This paper explores how spyware authors have changed their plan of attack and asks whether we should be more concerned with what we cannot see.
Download whitepaper

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map