Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message


Topic Zone

Latest News

Latest Features

  • 7 sneak attacks used by today's most devious hackers

    Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users

  • 7 sneak attacks used by today's most devious hackers

    Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users

  • True tales of (mostly) white-hat hacking

    Stings, penetration pwns, spy games -- it's all in a day's work along the thin gray line of IT security

  • Java's security problems 'unlikely to be resolved soon'

    Since the start of the year, hackers have been exploiting vulnerabilities in Java to carry out a string of attacks against companies including Microsoft, Apple, Facebook and Twitter, as well as home users.

  • Is this program malware or a false positive?

    Davikokar launched a program even though Norton warned that it was a Trojan. A subsequent hard drive scan revealed nothing bad. Davikokar then asked the Antivirus & Security Software forum if Norton had given a false positive?

  • The 9 greatest IT security threats

    Hacking has evolved from one-person crime of opportunity to an open market of sophisticated malware backed by crime syndicates and money launders

  • The worst security muddles (so far) of 2012

    From the embarrassing hack of a conversation between the FBI and Scotland Yard to a plethora of data breaches (think LinkedIn, eHarmony, Elantis, VMWare), security muddles have ruled the first half of 2012.

  • Windows 8 security - What's new in latest operating system

    Windows 8 will be released later this year, and the new Start screen and Metro-style apps will likely be the first changes you'll notice, but those aren't the only things that are new. Microsoft is also making some serious security enhancements to help keep your system safer and to improve Windows' ability to combat viruses and malware. It just may be the biggest improvement to Windows security yet.

  • Slow Flashback Trojan response is Apple's "Adobe moment"

    Apple could be experiencing an ?Adobe moment? over its handling of the Flashback Trojan, with security companies heaping criticism on the company for its slerotic response.

  • Five free Android security apps tried and tested

    There's been much controversy over mobile OS security, especially where Android is concerned. With 47% of the smartphone market in Q4 of 2011, according to ABI Research, it's no wonder that Android is getting attention.

Featured White Papers

Analysis of a business orientated trojan

Graham Cluley introduced the Win32/Corkow banking Trojan. The malware, which has been in the wild since at least 2011, has demonstrated continuous activity in the past year, infecting thousands of users. Version numbering of the various Trojan modules is another indicator that the malware authors are continually developing the trojan. Download this white paper to discover more on the information mentioned by Graham and view additional technical details.
Download whitepaper

Think your anti-virus software is working? Think again

We've been so bombarded by computer viruses, worms, Trojan horses and other malware that we have become acclimated to their presence. We subscribe to an anti-virus (AV) offering and hope for the best. Trouble is, AV has not been keeping up. Studies show that even though most organisations use AV, more and more are succumbing to attacks.
Download whitepaper

Understanding the risks of mobile applications

Mobile applications may have several types of security risk: language inherent risk, based on common security flaws in the language; malicious data exfiltration, in which sensitive data is surreptitiously transmitted from the phone; and platform specific risk, based on specific vulnerabilities inherent in the mobile platform.
Download whitepaper

Targeted trojan attacks

Targeted trojans pose a particularly potent threat that can deal devastating short and long-term damage to their victims.
Download whitepaper

Cutting the cost and complexity of managing endpoint security

Managing the desktops, laptops and servers at the endpoints of corporate networks is an increasingly complex, time-consuming and expensive task . This paper examines the issues of managing security across the network, discusses the key criteria involved in choosing a solution, and looks at how Sophos Endpoint Security eases the administrative burden and provides an enviable total cost of ownership.
Download whitepaper

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map