Follow Us

War on Error

Recent Posts

SCADA's frighteningly exposed underbelly

Industrial control systems and SCADA are under attack but from who or what?According to a Trend Micro researcher who decided to find out by setting up an be Industrial Control Systems (ICS) SCADA honeypot that mimicked among other things an...

Tags: china, industrial control system, scada, stuxnet, trend micro

RSSSubscribe to this blog

Google's Chromebook - from vanity project to stealthy Windows killer

How on earth did this happen? By its own high standards, Microsoft’s Windows 8 juggernaut is in a bit of a sales fix while a Google OS/Chromebook platform few consumers had even heard of six months ago is suddenly just...

Tags: acer, chromebook, google, google chrome os, linux, microsoft, windows, windows 8

RSSSubscribe to this blog

Iran vs USA - the world's first cyber-war has started

It sometimes hides behind hacktivism. But 75Gbps peak DDoS on US banks is no amateur protest...We can say with a growing sense  of certainty that the world’s first cyberwar is upon us, unfolding behind the scenes with a rising level...

Tags: denial-of-service attack, iran, james a. lewis, jpmorgan chase, middle east, new york times, united states, us government

RSSSubscribe to this blog

New Year resolution 2013 - ditch Java

Not even Oracle’s recent security overhaul to Java Development Kit 7, Update 10 (JDK 7u10) deserves to save its seat on the average non-business PC, a slew of informed experts have argued. I'm not about to disagree.We’ve written about Java...

Tags: java, java development kit, javascript, oracle, oracle corporation, personal computer, qualys, security

RSSSubscribe to this blog

'Eurograbber' SMS attack shows Android's vulnerability

We end 2012 with the alarming knowledge that the SMS two-factor authentication systems used to secure online banking have suffered their first major security failure and left a clutch of banks down to the tune of €36 million (£30 million).Between...

RSSSubscribe to this blog

Did Windows 8's Metro interface cost Steven Sinofsky his job?

Barley two weeks after the launch of Windows 8, the operating system’s chief architect and long-serving employee Steven Sinofsky is leaving Microsoft, it has been confirmed.Let's be frank. This is a huge shock no matter how Microsoft CEO Steve Ballmer...

RSSSubscribe to this blog

Flame is good, too good. Is Cyberwar now in the hands of Dr Strangelove?

The security experts and vendors will surely be delighted by the sudden and shocking outing of Stuxnet as part of a US Government malware programme. Long suspected of having been developed by a well-resourced state full of old-school Highway 101...

Tags: flame, iran, security, strangelove, stuxnet, windows update

RSSSubscribe to this blog

Why Apple and Amazon should pay more tax

Image via CrunchBase Last week Amazon was publically named as talented avoider of UK Corporation tax and this week it’s Apple’s turn. According to The Daily Mail, the US giant that generated sales approaching $10 billion in the UK last...

RSSSubscribe to this blog

Hackers spam Ticketweb users after email breach

Customers of the Ticketweb online ticketing site have been receiving fake emails after hackers broke into the company’s servers at the weekend, the company has admitted.In an email sent to its customer database the following day, the Ticketmaster subsidiary said...

Tags: email, hack, hacking

RSSSubscribe to this blog

Microsoft offers access to anti-botnet system

At last the world’s most effective but ignored digital police force, Microsoft, has said it plans to give third-parties including CERTs, ISPs and even foreign governments automated access to its formidable botnet intelligence feeds through an API.As an article written...

Tags: microsoft

RSSSubscribe to this blog

Previous [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] ... [42] continued on page 6 >>

Techworld White Papers

Optimising data protection for virtual environments

VM environments require the same level of data protection as does the physical server environment. Companies may use data protection tools built for the physical environment in the virtual world, but this has serious disadvantages.

Download Whitepaper

PCI Compliance: Are UK businesses ready?

Exploring the results of a recent survey, including: ? Levels of understanding of the standard ? Current perceptions of actual compliance status ? Attitudes toward addressing compliance

Download Whitepaper

Mobility Management for Dummies

Your complete guide to managing and securing mobile devices such as laptops and smartphones.

Download Whitepaper

Magic Quadrant for midrange and high-end NAS solutions

It is difficult to find one midrange or high-end NAS product that can cater to all needs. File systems embedded in NAS are often designed to solve one major pain point, with additional features being added later to broaden use cases and benefits.

Download Whitepaper

Techworld UK - Technology - Business

Oracle Video

Enabling agile and intelligent businesses

 Changing markets, competitive pressures and evolving customer needs are placing increasing pressure on IT to deliver greater flexibility and speed. Explore truly flexible SOA foundations with this Oracle video.

COLT White Paper

IT Misuse Survey

Complete this survey and you could win a Nexus One

Techworld are running a short survey to discover how UK businesses are managing Internet and email misuse in the Enterprise.

Complete Survey

Complete our survey and you could win a Sony E-book Reader.
Techworld have teamed up with HP to compile a survey relating to server virtualisation. Complete the short survey and you could be the lucky winner of a Sony E-book reader.

Complete the survey here

Site Map