Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

TROJAN HORSE

Topic Zone

Latest News

  • Is your Dropcam live feed being watched by someone else?

    Dropcam, the popular video monitoring camera, bills itself as "super simple security." But a pair of researchers plan to show at the Defcon hacking conference later this week how having a Dropcam could get a lot more complicated.

  • Proprietary firmware poses a security threat, Ubuntu founder says

    Mark Shuttleworth, the founder of the popular Ubuntu Linux distribution, believes proprietary firmware and unverifiable firmware code poses a serious security threat to users and encourages hardware manufacturers to implement support for their innovations through the Linux kernel instead.

  • 11 sure signs you've been hacked

    In today's threatscape, antivirus software provides little piece of mind. In fact, antimalware scanners on the whole are horrifically inaccurate, especially with exploits less than 24 hours old. After all, malicious hackers and malware can change their tactics at will. Swap a few bytes around, and a previously recognized malware program becomes unrecognizable.

  • 11 sure signs you've been hacked

    In today's threatscape, antivirus software provides little piece of mind. In fact, antimalware scanners on the whole are horrifically inaccurate, especially with exploits less than 24 hours old. After all, malicious hackers and malware can change their tactics at will. Swap a few bytes around, and a previously recognized malware program becomes unrecognizable.

  • EU Council chief did not use Russian USB stick given to summit leaders

    Security protocol for the European Council president meant he would never have used the tainted USB stick allegedly given to him by Russia at the G20 Summit council sources confirmed Wednesday.

  • People flock to anonymizing services after NSA snooping reports

    Companies offering anonymous Web browsing and communication services are seeing a huge increase in business since recent news leaks about the U.S. National Security Agency's mass data collection and surveillance activities.

  • Is Windows 8 a Trojan horse for the NSA? The German Government thinks so

    The German Government is now deeply suspicious that the Trusted Platform Module (TPM) technology built into a growing number of Windows 8 PCs and tablets is creating a gigantic back door for NSA surveillance, leaked documents have suggested.

  • "Jekyll" test attack sneaks through Apple App Store, wreaks havoc on iOS

    Acting like a software version of a Transformer robot, a malware test app sneaked through Apple's review process disguised as a harmless app, and then re-assembled itself into an aggressive attacker even while running inside the iOS "sandbox" designed to isolate apps and data from each other.

  • Elderwood hacker gang claims unlimited supply of zero-day bugs - Symantec

    An elite hacker group targeting defense industry sub-contractors has an inexhaustible supply of zero-days, or vulnerabilities that have yet to be publicised, much less patched, according to Symantec.

  • Apple to talk iOS 6 at Black Hat security conference

    Apple will give the hacking community a peek under the hood of iOS this week, with the company's first-ever presentation at the Black Hat security conference.

Latest Features

  • The 9 greatest IT security threats

    Hacking has evolved from one-person crime of opportunity to an open market of sophisticated malware backed by crime syndicates and money launders

  • Windows 8 security - What's new in latest operating system

    Windows 8 will be released later this year, and the new Start screen and Metro-style apps will likely be the first changes you'll notice, but those aren't the only things that are new. Microsoft is also making some serious security enhancements to help keep your system safer and to improve Windows' ability to combat viruses and malware. It just may be the biggest improvement to Windows security yet.

  • Do you know your cyberthreat terms?

    The watchdogs at the Government Accountability Office this week issued a report that takes a look at what information, or guidance as they call it, is available to help government agencies and public sector companies bulk up their cybersecurity efforts.

  • Spectrum clash builds around bionic implants

    The battle over scarce radio spectrum that has embroiled the mobile broadband world even extends to a little-known type of wireless network that promises to reconnect the human nervous system with paralyzed limbs.

  • Eleven free security and privacy protection programs

    Want to ensure that your PC and all of your files and data stay safe, secure and private without breaking the bank?

  • Epsilon attack - a turning point for the online marketing industry?

    Last week, consumers in the US were bombarded with email messages warning them of what may be the most widely felt data breach in US history. A company that most of them had never heard of, Epsilon Interactive, had been compromised and their names and email addresses had been stolen.

  • Technology security myths debunked

    Think you can hide behind the privacy of an "unlisted" cell phone number? Think again. Maybe you believe you don't need security software on a Mac or iPad. You'd swear that Firefox is the safest browser in town. Wrong on both counts.

  • Why I'm dropping Google

    For a company whose unofficial slogan is "Don't Be Evil," Google has been ignoring its so-called core value with alarming frequency as of late. And because of that, I decided to delete my Gmail account, along with all other Google services that I am able to do without. I have also deleted as much personal information as possible from my Google profile.

  • Mac security: What you can ignore

    It pays to keep your eyes open for credible reports of new Mac security problems and to change your computing habits accordingly.

  • Vista security annoying by design

    "The reason we put UAC into the platform was to annoy users. I'm serious," says Microsoft's David Cross.





Featured White Papers

Think your anti-virus software is working? Think again

We've been so bombarded by computer viruses, worms, Trojan horses and other malware that we have become acclimated to their presence. We subscribe to an anti-virus (AV) offering and hope for the best. Trouble is, AV has not been keeping up. Studies show that even though most organisations use AV, more and more are succumbing to attacks.
Download whitepaper

Cutting the cost and complexity of managing endpoint security

Managing the desktops, laptops and servers at the endpoints of corporate networks is an increasingly complex, time-consuming and expensive task . This paper examines the issues of managing security across the network, discusses the key criteria involved in choosing a solution, and looks at how Sophos Endpoint Security eases the administrative burden and provides an enviable total cost of ownership.
Download whitepaper

Why one virus engine is not enough

There is no single anti-virus engine on the market today that is always the fastest and most effective at identifying viruses, trojans and other threats. This white paper examines why having multiple anti-virus scanners at mail server level substantially reduces the chance of virus infection and explores ways in which this can be achieved.
Download whitepaper

Managed Security for the Small and Medium-Sized Business

Because of the expanding growth and complexity of the Internet and networking, our reliance on technology in every area of our lives, and the risks presented by a new breed of skillful hackers, serious security threats are an unfortunate certainty in both the home and office today. These threats are real and costly.
Download whitepaper

Solving the Puzzle of Vulnerability Management

Vulnerabilities in computer systems provide a gateway for attacks ? worms, viruses, Trojan horses, and a host of other malicious entities ? that cost businesses millions of dollars per incident, reduce share prices, erode customer confidence, and invite regulatory scrutiny.
Download whitepaper


Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map