Follow Us

War on Error

Recent Posts

Google's Project Zero flaw programme - do-gooding spin or a much-needed evolution?

It turns out that flaw bounties won't do it on their own. Google is the first to realise this. Germany had its post-WW2 Year Zero, New York has Ground Zero and now Google has added its name to the list...

RSSSubscribe to this blog

Google adopts plain English for new Chrome browser warnings

The smallest changes are sometimes the best ones Google is preparing a small but important tweak to the malware warnings thrown up when Chrome encounters a page blacklisted by Safe Browsing security, the firm has sneaked out in a Twitter...

RSSSubscribe to this blog

If Brian Krebs is this hated he must be doing some good

Journalists are supposed to report cybercrime. Now one of them is regularly on the receiving end. Security journalists are normally pretty much ignored by cyber-criminals but  campaigning security blogger Brian Krebs seems to have got under the skin of one...

RSSSubscribe to this blog

The Syrian Electronic Army is quieter but still out there

Paradoxically, the SEA's attacks 'micro-hacks' against the Sunday Times and The Sun this week suggest that defences are improving So often bitten in the past, website owners appear to be getting to grips with once-feared Syrian Electronic Army (SEA) after...

RSSSubscribe to this blog

Cybercrime costs $445 billion a year but that might be the least of it

In a world where governments ape the behaviour of cybercriminals, costs estimates risk missing the point. Cybercrime cost the global economy a staggering-sounding $445 billion in economic losses in 2013, a McAfee-sponsored report from the Center for Stategic and International...

RSSSubscribe to this blog

Gameover Zeus - the sudden unmasking of cybercrime's most wanted

The age of criminal impunity might finally be coming to an end Discount yesterday’s dramatic disruption of the Gameover Zeus botnet and CryptoLocker ransom malware, the real story is that the FBI has decided to name the Russian man, Evgeniy...

RSSSubscribe to this blog

Data breaches aren't about credit cards or passwords. What is at risk here are people's identities

Target, eBay and now Office. Why don't more sites use public key encryption systems like OneID? “Unfortunately we have been the subject of a security breach resulting in unauthorised access to your account,” read the email the British shoe...

RSSSubscribe to this blog

Cyberwar fact - China's PLA 61398 hackers enjoy a two-hour lunch break

The decision by the US to name names sets an intriguing but risky precedent The popular view of state cyberwar and espionage is that it has no name, no face and certainly doesn’t keep regular hours between nine to five....

RSSSubscribe to this blog

The eBay breach is part of a pattern - big brands can no longer protect their users

Megabrand eBay has fallen to the hackers - do the world’s most powerful brands know what they’re doing? Today eBay has set in motion what must be the largest password reset in Internet history after asking its entire user base...

RSSSubscribe to this blog

Is Windows 7 more vulnerable than XP? In fact 'Rotbrow' malware is a warning for all Windows users

According to Microsoft's SIR report, a single piece of malware raised Windows 7's infection rate above XP for the first time. But this tells us about the vulnerabulity of Windows as a platform and not just Windows 7. Does Windows...

RSSSubscribe to this blog

[1] [2] [3] [4] [5] [6] [7] [8] [9] [10] ... [42] continued on page 2 >>

Techworld White Papers

Optimising data protection for virtual environments

VM environments require the same level of data protection as does the physical server environment. Companies may use data protection tools built for the physical environment in the virtual world, but this has serious disadvantages.

Download Whitepaper

PCI Compliance: Are UK businesses ready?

Exploring the results of a recent survey, including: ? Levels of understanding of the standard ? Current perceptions of actual compliance status ? Attitudes toward addressing compliance

Download Whitepaper

Mobility Management for Dummies

Your complete guide to managing and securing mobile devices such as laptops and smartphones.

Download Whitepaper

Magic Quadrant for midrange and high-end NAS solutions

It is difficult to find one midrange or high-end NAS product that can cater to all needs. File systems embedded in NAS are often designed to solve one major pain point, with additional features being added later to broaden use cases and benefits.

Download Whitepaper

Techworld UK - Technology - Business

Oracle Video

Enabling agile and intelligent businesses

 Changing markets, competitive pressures and evolving customer needs are placing increasing pressure on IT to deliver greater flexibility and speed. Explore truly flexible SOA foundations with this Oracle video.

COLT White Paper

IT Misuse Survey

Complete this survey and you could win a Nexus One

Techworld are running a short survey to discover how UK businesses are managing Internet and email misuse in the Enterprise.

Complete Survey

Complete our survey and you could win a Sony E-book Reader.
Techworld have teamed up with HP to compile a survey relating to server virtualisation. Complete the short survey and you could be the lucky winner of a Sony E-book reader.

Complete the survey here

Site Map