Follow Us

War on Error

Recent Posts

Full-Disclosure reaches the end - "there is no honour amongst hackers any more"


Full Disclosure was not the only security vulnerabilities discussion list but somehow it has always felt like the one that counted. The announcement by admin John Cartwright that it is closing thanks to the actions of an unnamed security researcher...


RSSSubscribe to this blog

Windows license fee cut to $15? This is as good as marketing gets


Windows 8.1's problems go deeper than its price A single Bloomberg report quoting unnamed Microsoft sources and suddenly the Internet is awash with headlines telling us that PC vendors will now be charged only $15 (£9) to load Windows 8.1...


RSSSubscribe to this blog

Chromebooks and Linux on the rise, ad network traffic numbers show


Chromebooks remain a tiny presence in the US, says one ad network. But is looking at traffic necessarily the right measurement? The share of North American web traffic from Chromebook systems doubled last year but was still only 0.2 percent...


RSSSubscribe to this blog

The Syrian Electronic Army attack on Forbes shows the irresistible power of phishing


The Syrian Electronic Army might be predators but their attacks don't need big teeth Earlier this week the Forbes news site became the latest media organisation to find itself on the receiving end of the attentions of the Syrian Electronic...


RSSSubscribe to this blog

Stupid passwords are security's silent rebellion


Passwords might be lousy, but they're also cheap If you assumed the old-fashioned ‘000000’ represented the nadir of bad passwords, think again. According SplashData, zero (repeated six times) only just scrapes on its list of the worst passwords of 2013...


RSSSubscribe to this blog

The rise and rise of domestic spyware apps


When a stranger installs a surveillance app we call it spyware. Does the same apply if it's a spouse? Domestic spyware monitoring has been quietly booming in the PC world for years without any particularly noticing or caring and now...


RSSSubscribe to this blog

Cisco, Juniper, Samsung, Huawei - is nobody safe from the NSA?


New Snowden documents suggest that the NSA is exploiting unpublished flaws in the routers, firewalls and hard drives of the largest tech vendors. Months into what surely deserves to be called the Internet’s ‘Snowden era’ the leaks keep coming, indeed...


RSSSubscribe to this blog

Does Microsoft fear Google's Chromebooks or the people who buy them?


Microsoft never liked Larry Ellison's network computers. Clinging to that orthodoxy risks another mis-step The 1990’s were the greatest of times for Microsoft and Windows but history will surely record it as the era when its leaders also painted themselves...


RSSSubscribe to this blog

Chromebooks: is Google's computer a sales flop or misunderstoood gem?


PC sales are in steady global decline and yet it is Google’s modest newcomer, the Chromebook, that seems to get a kicking on a regular basis simply for daring to exist.  The latest example is by commentator Ed Bott, who...


RSSSubscribe to this blog

Of course the NSA spies on Angela Merkel. The problem is she can't spy back


Well-executed spying is an essential safety valve. But the NSA has got ahead of its friends So the world now knows that the US has definitely been spying on the mobile phone calls of Angela Merkel, François Hollande, David Cameron and...


RSSSubscribe to this blog

Previous [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] ... [42] continued on page 4 >>

Techworld White Papers

Optimising data protection for virtual environments

VM environments require the same level of data protection as does the physical server environment. Companies may use data protection tools built for the physical environment in the virtual world, but this has serious disadvantages.

Download Whitepaper

PCI Compliance: Are UK businesses ready?

Exploring the results of a recent survey, including: ? Levels of understanding of the standard ? Current perceptions of actual compliance status ? Attitudes toward addressing compliance

Download Whitepaper

Mobility Management for Dummies

Your complete guide to managing and securing mobile devices such as laptops and smartphones.

Download Whitepaper

Magic Quadrant for midrange and high-end NAS solutions

It is difficult to find one midrange or high-end NAS product that can cater to all needs. File systems embedded in NAS are often designed to solve one major pain point, with additional features being added later to broaden use cases and benefits.

Download Whitepaper

Techworld UK - Technology - Business

Oracle Video

Enabling agile and intelligent businesses

 Changing markets, competitive pressures and evolving customer needs are placing increasing pressure on IT to deliver greater flexibility and speed. Explore truly flexible SOA foundations with this Oracle video.

Watch
COLT White Paper

IT Misuse Survey

Complete this survey and you could win a Nexus One

Techworld are running a short survey to discover how UK businesses are managing Internet and email misuse in the Enterprise.

Complete Survey

Complete our survey and you could win a Sony E-book Reader.
Techworld have teamed up with HP to compile a survey relating to server virtualisation. Complete the short survey and you could be the lucky winner of a Sony E-book reader.

Complete the survey here

Site Map

Test