Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message


Topic Zone

Latest News

  • 12 ethical dilemmas gnawing at developers today

    The tech world has always been long on power and short on thinking about the ramifications of this power. If it can be built, there will always be someone who will build it without contemplating a safer, saner way of doing so, let alone whether the technology should even be built in the first place. The software gets written. Who cares where and how it's used? That's a task for somebody in some corner office.

  • Fake Android anti-virus app taken down

    Virus Shield, by developer Deviant Solutions, was a handsome, apparently easy-to-use security app for Android devices. For $4, the app promised hassle-free, ad-free security for Android users, without impacting battery life or performance. And, mostly, Virus Shield delivered - no ads, no fuss.

  • Infamous Zotob virus author 'Diabl0' arrested in Thailand on phishing charges

    On-the-run hacker Farid Essebar, best known for writing the 2005 Zotob worm using the handle ?Diabl0?, has been arrested by police in Thailand on new charges connected to phishing Swiss online banking sites.

  • Can anti-virus technology morph into breach detection systems?

    Anti-virus software is still often considered a "checkbox" item for enterprise deployments, especially on Microsoft Windows, but over the decades, anti-virus software changed to do far more than just signature-based virus blocking.

  • Wi-Fi 'virus' could be used to attack wireless access points, researchers discover

    Dense concentrations of Wi-Fi access points and routers in large cities could be attacked by malware able to spread silently from node to node, researchers at the University of Liverpool have shown for the first time.

  • Marussia Formula 1 team's race testing disrupted by Trojan malware

    The Marussia Formula 1 racing team has admitted losing an entire day?s race testing in Bahrain last week after the computer systems used for in-car telemetry were disrupted by Trojan malware.

  • Bitcoins, other digital currencies stolen in massive 'Pony' botnet attack

    Cybercriminals have infected the computers of digital currency holders, using a virus known as "Pony" to make off with account credentials, bitcoins and other digital currencies in one of the largest attacks on the technology, security services firm Trustwave said.

  • Cryptolocker scrambles US law firm's entire cache of legal files

    A small US law firm has bravely admitted losing its entire cache of legal documents to the Cryptolocker Trojan despite attempting to pay the $300 (£180) ransom in a bid to have them unscrambled.

  • 11 sure signs you've been hacked

    In today's threatscape, antivirus software provides little piece of mind. In fact, antimalware scanners on the whole are horrifically inaccurate, especially with exploits less than 24 hours old. After all, malicious hackers and malware can change their tactics at will. Swap a few bytes around, and a previously recognized malware program becomes unrecognizable.

  • Hackers use a trick to deliver Zeus banking malware

    Hackers found a new way to slip past security software and deliver Zeus, a long-known malicious software program that steals online banking details.

Latest Features

Featured White Papers

Securing Virtual Unified Communications Solutions

In virtualised environments it?s of crucial importance to use tailored unified communications security solutions to protect virtual borders. These UC security solutions include firewalls, session border controllers, NAC, user provisioning, access management and single sign-on along with virus and malware protection. Download this white paper to discover how your organisation can provide a high standard of security for virtualised environments at a reasonable cost.
Download whitepaper

Flexible businesses for reliable continuity

The nature of our use of technology, process and systems to run businesses nowadays ? and the stable environment these elements need in which to run smoothly ? is at odds with the world. No matter how hard we try, we can never be certain that a natural disaster won?t strike, or a virus won?t take down out IT systems, or an accident won?t threaten to disrupt trading. So when something does go wrong, the fallout can be financially crippling for businesses. Even a few hours downtime can mean a void that the competition will be fighting over to fill. Instant communications and a growing demand from customers for seamless service means gaps in trading will go noticed immediately. Reactions will be swift, so companies need to ensure their reactions are swifter.
Download whitepaper

Avoiding Legal Traps on the Web

One of the chief concerns for IT professionals tasked with protecting network assets should be the legal implications of unmanaged Internet access. The media is rife with stories about liability judgments against companies as a result of a worker?s illegal activity on the Internet while using company equipment.
Download whitepaper

What Email Hackers Know that you Don't

E-mail systems such as Microsoft Exchange, Lotus Notes and GroupWise were constructed with a single purpose in mind: accept and send the maximum amount of mail, and route that mail as efficiently as possible. Without question this has succeeded; e-mail is the most commonly utilized business communication tool on the planet, and its use is projected to continue to rise. In fact, the current volume of e-mail sent worldwide is now more than 50 billion messages per day, with that number expected to double by 2008.
Download whitepaper

The growing scale of the threat problem

This paper examines thehistory of viruses and spam and looks at how collaboration between virus writers and spammers is impacting enterprises. It also looks at future developments, and how the expertise of SophosLabs is applied to providing continuous protection against evolving threats.
Download whitepaper

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map