Follow Us

War on Error

Recent Posts

Android's security weakness is a recipe for trouble


Android is now growing at a rate of 500,000 activated devices per month, or so announced development head Andry Rubin in one of his super-rare tweets from a biblical mountain top.That’s a healthy growth rate and probably better than anything...


Tags: android, google, iphone

RSSSubscribe to this blog

Teen hacking comes back from the dead


It’s Generation 2.0...Here’s another gem of conventional wisdom that made sense until it suddenly didn’t - hackers are all professional criminals now, out to make money. The teen hacker enthusiast and pranksters from the early days of anti-sec were a...


Tags: ddos attack, hacker, hacking, security

RSSSubscribe to this blog

The BlackBerry, from boom to doom. And back?


The BlackBerry's users can still save it. But will RIM let them?After a decade in which it became a standard fitment in boardrooms and governments, saw it enthused over by a new US President, and singlehandedly turned addictive ‘crackberry’ texting...


Tags: apple iphone, blackberry. android

RSSSubscribe to this blog

Mobile Linux could yet save the netbook


Could the obscure and apparently discarded MeeGo mobile Linux OS yet save netbooks? Or is it the other way around?Users quite liked netbooks but aside from one or two Asian vendors, laptop companies didn’t, fearing they were migrating users from...


Tags: linux, meego

RSSSubscribe to this blog

What Apple scandals? This company is bulletproof


Apple was recently rated as the most valuable brand in the universe in a year it has made billions for its shareholders. Odd then that this record year has also been the one where the company has had to endure...


Tags: apple, apple ipad 2

RSSSubscribe to this blog

Researchers dig deep hole in Chrome's sandbox


It had to happen eventually, but finally someone has found a way to break through Google’s much-vaunted Chrome sandbox security, which let’s remind ourselves, first appeared in the browser as long ago as 2008.As exploits go, the one publicised by...


Tags: google chrome

RSSSubscribe to this blog

William, Catherine and Osama - a long hard week for the Internet


It’s not often that the Internet sets two traffic records in a single week, but last week was no ordinary seven days. It was a case of one wedding and a funeral. In the space of three days two major...


Tags: google search, malware, security, spam

RSSSubscribe to this blog

The LastPass 'hack' is a warning on password weakness


Two days ago, the hugely popular LastPass online password management system went ‘a bit Sony’ on it users, reporting a possible hack, asking that many users reset master passwords.The hack was minor, probably affected a tiny number of its users,...


Tags: password security, security

RSSSubscribe to this blog

Microsoft's Streetside spells trouble for Apple not Google


The fascinating re-fashioning of Microsoft from a software company into an information leviathan is gathering pace with news that Redmond plans to send a fleet of camera cars down European streets to create a rival to Google’s Street View.Called Streetside...


Tags: microsoft streetside

RSSSubscribe to this blog

Google is right to go slow on Android 3.0


It’s hands off Google’s Android 3.0 ('Honeycomb') for tablets, at least for the time being, and developers - some developers at least - are spooked.Some see Google’s decision to delay the source code release for the tablet-oriented OS for months...


Tags: android, google

RSSSubscribe to this blog

Previous [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] ... [42] continued on page 8 >>

Techworld White Papers

Optimising data protection for virtual environments

VM environments require the same level of data protection as does the physical server environment. Companies may use data protection tools built for the physical environment in the virtual world, but this has serious disadvantages.

Download Whitepaper

PCI Compliance: Are UK businesses ready?

Exploring the results of a recent survey, including: ? Levels of understanding of the standard ? Current perceptions of actual compliance status ? Attitudes toward addressing compliance

Download Whitepaper

Mobility Management for Dummies

Your complete guide to managing and securing mobile devices such as laptops and smartphones.

Download Whitepaper

Magic Quadrant for midrange and high-end NAS solutions

It is difficult to find one midrange or high-end NAS product that can cater to all needs. File systems embedded in NAS are often designed to solve one major pain point, with additional features being added later to broaden use cases and benefits.

Download Whitepaper

Techworld UK - Technology - Business

Oracle Video

Enabling agile and intelligent businesses

 Changing markets, competitive pressures and evolving customer needs are placing increasing pressure on IT to deliver greater flexibility and speed. Explore truly flexible SOA foundations with this Oracle video.

Watch
COLT White Paper

IT Misuse Survey

Complete this survey and you could win a Nexus One

Techworld are running a short survey to discover how UK businesses are managing Internet and email misuse in the Enterprise.

Complete Survey

Complete our survey and you could win a Sony E-book Reader.
Techworld have teamed up with HP to compile a survey relating to server virtualisation. Complete the short survey and you could be the lucky winner of a Sony E-book reader.

Complete the survey here

Site Map

Test