Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

WORM

Topic Zone

Latest News

Latest Features

  • Top security threats in 2013: Mobile attacks

    For years, information security experts have predicted a spike in mobile malware. Will 2013 be the year of mobile attacks? And what other security threats are on the horizon?

  • Which smartphone is the most secure?

    These days, it is almost impossible to meet someone who doesn't own a cell phone. More specifically, smartphones, whether it be the trendy iPhone, corporate favored Blackberry or modern Windows Mobile, almost everyone has joined the smartphone frenzy - and with good reason. A smartphone offers more advanced computing ability and connectivity than a contemporary phone.

  • The Internet has created 'the largest trust gap' in history, says Bruce Schneier

    Trust is at the heart of security, argues Bruce Schneier in his latest book, "Liars and Outliers".

  • Cybercrime is 'much bigger than al Qaeda' in the US

    Security experts confirm concern outlined by DHS Secretary in recent speech

  • 10 hacks that made headlines

    Here are ten hacking incidents through history that made some of the biggest headlines.

  • Modern warfare: On the frontlines of cyber defence

    Something has gone terribly wrong on the plant floor at ACME Specialty Chemical International.

  • Cyber risk and the future of national response

    In September 2007, in a remote laboratory in Idaho, researchers began to show that the security picture had begun to change, dramatically and irreversibly.

  • Black Hat researcher demonstrates power plant hack

    The night before the start of this week's Black Hat hacker conference here in Las Vegas, security researcher Dillon Beresford gave a demonstration to a small audience in his room at Caesar's Palace. The topic: how a hacker could take over the Siemens S7 computers that are used to control engines, machines and turbines in tens of thousands of industrial facilities.

  • Six new and rising hacker threats

    Hackers never sleep, it seems. Just when you think you've battened down the hatches and fully protected yourself or your business from electronic security risks, along comes a new exploit to keep you up at night. It might be an SMS text message with a malevolent payload or a stalker who dogs your every step online. Or maybe it's an emerging technology like in-car Wi-Fi that suddenly creates a whole new attack vector.

  • Twenty glorious years of Windows malware

    Windows PCs have been under siege for 20 years. What a difference those two decades make.





Featured White Papers

The Value of Effective Disaster Recovery Planning

Your organization is producing and saving more information than ever before. With the price of storage decreasing due to ongoing advances in technology, many businesses double their stored information every 18 months. Often this is a result of business initiatives, laws, and federal requirements that mandate that organizations retain specific information for a designated number of years.
Download whitepaper

Webwasher Proactive Scanning

Within recent years, the lag between emersion of new malware and the signature database update required by signature-driven anti-virus scanners to block the new threat, has grown alarmingly. Leaving computers unprotected during this so-called ?Day Zero? phase, traditional anti-virus scanners need to be supplemented by an additional line of defense providing proactive protection to mitigate the gap left by signature-driven, ?after the-fact? protection mechanisms.
Download whitepaper

Threat Control and Containment

Network security threats have the potential to significantly impede productivity, disrupt business and operations, and result in loss of information?which can lead to financial losses and potential non-compliance.
Download whitepaper

Threat Control and Containment

Network security threats have the potential to significantly impede productivity, disrupt business and operations, and result in loss of information?which can lead to financial losses and potential non-compliance.
Download whitepaper

Threat Control and Containment: New Strategies for a Changed Threat Landscape

Network security threats have the potential to significantly impede productivity, disrupt business and operations, and result in loss of information?which can lead to financial losses and potential non-compliance.
Download whitepaper


Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map