Follow Us

War on Error

Recent Posts

Found a security hole? It could be worth $2,000.


It seems we exaggerated the innovation of Com/TippingPoint’s controversial Zero Day Initiative. The scheme pays vetted researchers to report vulnerabilities to the company in a responsible way, thereby avoiding these holes getting into the public domain and being exploited...


Tags: hacker

RSSSubscribe to this blog

Criminals scam UK taxpayers


Build those poorly conceived and insecure applications and they will come. Trust the UK Revenue & Customs service to remind us of this tedious maxim with its online tax credit application system, which has had just had its credibility...


RSSSubscribe to this blog

Carry on spyware


It’s hard to feel sorry for anyone making a living out of selling keylogging software. Officially, there are legitimate uses for putting software on a PC in order to monitor how that computer is being used but we can’t...


Tags: apple, internet, mac

RSSSubscribe to this blog

The slow take-up of U3


Several months on from launch, and it looks as if the " target="_blank">U3 drive standard will take time to catch on. In case you don’t know, U3 drives are physically identical to conventional USB storage drives, but come with...


Tags: email, virus

RSSSubscribe to this blog

Sony sent back to DRM drawing board


We’re not fans of surveys at Techworld, but couldn’t help noticing the findings of a poll of 1,500 customers of anti-virus company Sophos. According " target="_blank">to the poll, 98 percent of those considered Sony’s digital rights management software (see...


Tags: virus

RSSSubscribe to this blog

Doom-mongers jump the gun


No sooner had the virtual ink dried on our ">commentary on the alarming Troj_emfsploit.A Trojan, than the company that discovered it – Trend Micro – scaled down its claims. The gist was that the malware appeared to be exploiting...


Tags: virus

RSSSubscribe to this blog

What's happened to common vulnerability scoring?


Not everyone in IT has heard of the Common Vulnerability Scoring System (CVSS), launched formally earlier this year, but it could turn into one of the most interesting stories of 2006 nonetheless. The name has a bureaucratic ring to...


RSSSubscribe to this blog

Firewalls go industrial


It’s hard to believe that there is still a huge untapped sector out there begging to be sold security hardware, but there is. News arrived this week that a small, little-known German outfit called " target="_blank">Innominate has launched a...


Tags: apple, firewall, hacker, mac, virus

RSSSubscribe to this blog

Tuesday will be zero day. One day.


Only two days after Microsoft issued a patch for a “critical” flaw related to the graphics rendering engine in Windows, Trend Micro has unearthed a Trojan out to exploit it. As it happens, the Troj_emfsploit.A (Trend’s name) does nothing...


Tags: virus

RSSSubscribe to this blog

Cookies that don't crumble


Browser cookies are a simple means of tracking how a browser is interacting with a website. Each one carries some history of such events, but also basic elements of software identification. They’ve long been a target for fraudsters intent...


RSSSubscribe to this blog

Previous [31] [32] [33] [34] [35] [36] [37] [38] [39] [40] continued on page 38 >>

Techworld White Papers

Optimising data protection for virtual environments

VM environments require the same level of data protection as does the physical server environment. Companies may use data protection tools built for the physical environment in the virtual world, but this has serious disadvantages.

Download Whitepaper

PCI Compliance: Are UK businesses ready?

Exploring the results of a recent survey, including: ? Levels of understanding of the standard ? Current perceptions of actual compliance status ? Attitudes toward addressing compliance

Download Whitepaper

Mobility Management for Dummies

Your complete guide to managing and securing mobile devices such as laptops and smartphones.

Download Whitepaper

Magic Quadrant for midrange and high-end NAS solutions

It is difficult to find one midrange or high-end NAS product that can cater to all needs. File systems embedded in NAS are often designed to solve one major pain point, with additional features being added later to broaden use cases and benefits.

Download Whitepaper

Techworld UK - Technology - Business

Oracle Video

Enabling agile and intelligent businesses

 Changing markets, competitive pressures and evolving customer needs are placing increasing pressure on IT to deliver greater flexibility and speed. Explore truly flexible SOA foundations with this Oracle video.

Watch
COLT White Paper

IT Misuse Survey

Complete this survey and you could win a Nexus One

Techworld are running a short survey to discover how UK businesses are managing Internet and email misuse in the Enterprise.

Complete Survey

Complete our survey and you could win a Sony E-book Reader.
Techworld have teamed up with HP to compile a survey relating to server virtualisation. Complete the short survey and you could be the lucky winner of a Sony E-book reader.

Complete the survey here

Site Map

Test