Follow Us

War on Error

Recent Posts

Eugene Kaspersky, patent troll killer

Defeating patent trolls (disambiguation: patent asserting entities) in court has been a rare event in the tech industry but security firm Kaspersky Lab seems to be making a habit of it. Its latest scalp is the notorious Lodsys, which last...

RSSSubscribe to this blog

The NSA has just screwed the security industry

Shocked that the NSA might have found a way around some of the Internet’s core encryption security? Fear not, the world has been here before with a piece of silicon called the MYK-78. Known as the ‘Clipper chip’ it was...

RSSSubscribe to this blog

Facebook, Google and Twitter caught monitoring URLs in messages - legitimate or spying?

Large Internet firms including Facebook, Google and Twitter are monitoring some web links sent between their users, including those in private communications, a research firm has confirmed.Swiss security consultancy High-Tech Bridge made the discovery by performing the simple experiment of...

RSSSubscribe to this blog

Skype ditched P2P super-nodes because it had to, says chief architect

Skype, hated by dictators, law enforcement and corporate security regulators the world over and yet an essential communication tool for dissidents and anyone that wants phone, video and instant message calls to take place in privacy for fair reason or...

Tags: matthew kaufman, microsoft, national security agency, nsa, peer-to-peer, skype

RSSSubscribe to this blog

Are ESTA visa scams really dead? Not yet

Last weekend The Guardian newspaper declared a dramatic victory over the ESTA (Electronic System for Travel Authorization) visa scammers that have for some years polluted the top of Google’s search engine results, ready to pounce on anyone travelling to the...

Tags: electronic system for travel authorization, esta, google, microsoft, web search engine

RSSSubscribe to this blog

Ethernet is 40 - from Alohanet to Terabit and beyond

Or how Bob Metcalfe set out to solve the challenge of wireless data and inadvertently gave Starbucks a business model. Is there a more ubiquitous, enabling technology than Ethernet? If there is it’s hard to think what it might be. It...

Tags: bob metcalfe, ethernet, local area network, personal computer, robert metcalfe, starbucks, token ring

RSSSubscribe to this blog

FinFisher: legitimate spy program or dubious commercial malware?

Is the FinFisher suite legitimate surveillance or software’s Dr Strangelove? The UK is a bulwark against cybercrime, noted the world over for its respect for the principles of law and order; except that is when a British-based firm is accused...

Tags: bahrain, czech republic, finfisher, firefox, gamma international, strangelove

RSSSubscribe to this blog

Scotland's Internet startups still firing on one cylinder

Now that Silicon Glen is a memory Scotland needs more than worthy aspirations Internet startups can look effortless. Google surfaced like an information leviathan from the genius factory of Stanford University, Facebook came out of a dorm room full...

Tags: edinburgh, london, san francisco, scotland, silicon fen, silicon glen, stanford university, virgin media pioneers

RSSSubscribe to this blog

Did a 300Gb/s DDoS really slow the Net? Only if you believe in Smurfs

Lock up your DNS - the little blue men are back.A day on from what was only yesterday being described as a DDoS attack so large it had slowed the Internet itself, the sceptics have rallied with a simple question:...

Tags: arbor networks, cloudflare, denial-of-service attack, domain name system, internet traffic, ip address, spamhaus, the spamhaus project

RSSSubscribe to this blog

Will China's techies go near Canonical's 'Kylin' Linux?

Linux in China, Ubuntu styleRecent history is strewn with the corpses of national operating system projects and it is probably too early to tell whether Canonical's Ubuntu ‘Kylin’ collaboration with China’s Chinese Ministry of Industry and Information Technology (CSIP) will...

Tags: canonical, china, linux, national university of defense technology, red flag linux, steve ballmer, ubuntu

RSSSubscribe to this blog

Previous [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] ... [42] continued on page 5 >>

Techworld White Papers

Optimising data protection for virtual environments

VM environments require the same level of data protection as does the physical server environment. Companies may use data protection tools built for the physical environment in the virtual world, but this has serious disadvantages.

Download Whitepaper

PCI Compliance: Are UK businesses ready?

Exploring the results of a recent survey, including: ? Levels of understanding of the standard ? Current perceptions of actual compliance status ? Attitudes toward addressing compliance

Download Whitepaper

Mobility Management for Dummies

Your complete guide to managing and securing mobile devices such as laptops and smartphones.

Download Whitepaper

Magic Quadrant for midrange and high-end NAS solutions

It is difficult to find one midrange or high-end NAS product that can cater to all needs. File systems embedded in NAS are often designed to solve one major pain point, with additional features being added later to broaden use cases and benefits.

Download Whitepaper

Techworld UK - Technology - Business

Oracle Video

Enabling agile and intelligent businesses

 Changing markets, competitive pressures and evolving customer needs are placing increasing pressure on IT to deliver greater flexibility and speed. Explore truly flexible SOA foundations with this Oracle video.

COLT White Paper

IT Misuse Survey

Complete this survey and you could win a Nexus One

Techworld are running a short survey to discover how UK businesses are managing Internet and email misuse in the Enterprise.

Complete Survey

Complete our survey and you could win a Sony E-book Reader.
Techworld have teamed up with HP to compile a survey relating to server virtualisation. Complete the short survey and you could be the lucky winner of a Sony E-book reader.

Complete the survey here

Site Map