Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

VIRUS SOFTWARE

Topic Zone

Latest News

  • FAQ: What you need to know about the end of Windows XP support

    Microsoft issues its final security update today for Windows XP, the 13-year-old operating system that remains the second most used platform in the world despite the certainty that after April 8 it will rapidly become dangerously insecure.

  • Patch management blunders facilitate cybercrime

    Failures in patch management of vulnerable systems have been a key enabler of cybercrime, according to the conclusions reached in Solutionary's annual Global Threat Intelligence Report out today, saying it sees botnet attacks as the biggest single threat.

  • Amazon's WorkSpaces becomes generally available

    Amazon Web Services' hosted virtual desktops have become generally available, priced from US$35, but the company and its competitors have a lot of hurdles to overcome before this sort of technology is widely used by businesses.

  • Can anti-virus technology morph into breach detection systems?

    Anti-virus software is still often considered a "checkbox" item for enterprise deployments, especially on Microsoft Windows, but over the decades, anti-virus software changed to do far more than just signature-based virus blocking.

  • 9 must-do's if you must stick with Windows XP

    Without updates after April 8 Windows XP is expected to fall prey to any number of zero-day attacks for which Microsoft will provide no defense, but there are some things die-hard XP users can do to make their machines safer.

  • Large number of organisations still struggle with PCI DSS compliance, Verizon finds

    Large numbers of firms still struggle to achieve full PCI DSS 2.0 compliance despite meeting almost all of its requirements, according to an analysis of real-world assessments carried out by Verizon.

  • Target, Neiman Marcus executives defend security practices

    Recent data breaches at Target and Neiman Marcus were sophisticated attacks not detected by robust cybersecurity measures, executives with the two companies told U.S. lawmakers.

  • 11 sure signs you've been hacked

    In today's threatscape, antivirus software provides little piece of mind. In fact, antimalware scanners on the whole are horrifically inaccurate, especially with exploits less than 24 hours old. After all, malicious hackers and malware can change their tactics at will. Swap a few bytes around, and a previously recognized malware program becomes unrecognizable.

  • FTC: Medical transcription firm allowed histories to be on search engine

    A medical transcription company has agreed to settle a U.S. Federal Trade Commission complaint that its inadequate security measures allowed the personal information, including medical histories and examination notes, of thousands of people to be published on the Internet.

  • Symantec's results show firm battling changing security market

    With sales of security software predicted to rise this year by Gartner, one of the top security software houses, Symantec, appears to be struggling in the very market it should be dominating.

Latest Features

  • A clear-eyed guide to Mac OS X's actual security risks

    Apple has improved its security in recent years, but is it enough?

  • 12 personal security resolutions for 2013

    Among your typical New Year's resolutions - lose weight, stop smoking, be happier - you should consider making some pledges to better secure your digital life. You might even be healthier if you can prevent the stress of a digital disaster, like malware wiping out your PC, having your online accounts hacked, or becoming a victim of identify theft because of a phishing scam or data theft. With that in mind, here are some security resolutions you should consider for the new year.

  • Is this program malware or a false positive?

    Davikokar launched a program even though Norton warned that it was a Trojan. A subsequent hard drive scan revealed nothing bad. Davikokar then asked the Antivirus & Security Software forum if Norton had given a false positive?

  • Windows 8 security focuses on early malware detection

    Security experts say Windows 8 is the most secure Microsoft OS to date, but that doesn't mean malware won't evolve to exploit it

  • Kaspersky's exploit-proof OS leaves security experts skeptical

    While there is a need for a more secure operating system for industrial control systems, experts say a US-built OS would be preferred

  • Cloud business benefits seen in engineering, retail, media and logistics

    The business benefits of sourcing platforms, infrastructure or applications via internet-based public services or private enterprise services have been much hyped over recent years. Dubbed cloud computing public and private cloud computing is a major topic in enterprise technology at present. However, there can be no doubt adoption of both types of cloud services has reached the corporate mainstream.

  • Network virtualisation will lead to security control changes

    Gartner analyst Neil MacDonald's specialty is security, and he not only keeps a close eye on what security vendors are doing, but he's an advocate for change as fundamental network technologies evolve. Virtualisation is having an enormous impact, leading to questions about the role of physical security appliances in a virtual world. MacDonald predicts by 2015, 40% of security controls in the enterprise data center will be virtualised, up from 5% in 2010. In a recent interview, MacDonald talked about the future of security in the virtual world.

  • Spammers staying ahead of filters and law enforcement

    When Microsoft slayed the notorious botnet Rustock, which had been sending as much as 40% of all spam worldwide, in March 2011, it forced the volume of spam into a decline from which it has never fully recovered.

  • Is end point security a waste of time?

    The first board member at your organisation to walk through the door with an iPad did the IT team a massive favour. Put bluntly, there was no longer an argument. They had to ease the purse strings on your requests to fund management and security systems to go with your enterprise mobility projects.

  • Is end point security a waste of time?

    The first board member at your organisation to walk through the door with an iPad did the IT team a massive favour. Put bluntly, there was no longer an argument. They had to ease the purse strings on your requests to fund management and security systems to go with your enterprise mobility projects.





Featured White Papers

MSQ Partners antivirus case study

With cyber threats becoming more prolific to enterprises, antivirus software has become a necessity. Protecting your organisation from malware, adware, suspicious files and behaviour, and unauthorised software whilst maintaining streamlined operations is essential. Download this case study to see how MSQ Partners utilised antivirus software to protect themselves from cyber attack and learn how your organisation can do the same.
Download whitepaper

Intelligence network

Malware is at such high levels (more than 60 million unique samples per year) that protecting an endpoint with traditional anti-virus software has become futile. More than 100,000 new types of malware are now released every day, and anti-virus vendors are racing to add new protection features to try to keep their protection levels up.
Download whitepaper

Think your anti-virus software is working? Think again

We've been so bombarded by computer viruses, worms, Trojan horses and other malware that we have become acclimated to their presence. We subscribe to an anti-virus (AV) offering and hope for the best. Trouble is, AV has not been keeping up. Studies show that even though most organisations use AV, more and more are succumbing to attacks.
Download whitepaper

The ESG information security management maturity model

Since enterprises face a much more dangerous threat landscape, they are actively evolving historical tactical security defences into a more formal information security management framework. Based upon this evolutionary trend, this white paper explores a newly developed 4-phased security management maturity model.
Download whitepaper

Security solutions

As the business world moves from the bricks and mortar defensible estates into cyberspace and the virtual world, has your company made similar controls to check and defend your assets?
Download whitepaper


Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map