Follow Us

War on Error

Recent Posts

Rogue Android apps are suddenly among us


After a long phoney war when a lot was said but nothing much actually happened, Android is finally facing the predicted surge in app criminality that its open software model invites.The first Android malware landmark came as recently as August...


Tags: android, antivirus, security

RSSSubscribe to this blog

Apple's subscription levy spells trouble for consumers


Imagine a world where every newspaper and magazine sold hands money not just to the creator of that content but to the company that built the platform on which it is being delivered. As boring as it sounds, this is...


Tags: amazon kindle, android, iphone

RSSSubscribe to this blog

Is 'Safer Internet Day' missing the point?


I call it the ‘Internet certainty principle’, the belief that the Internet is perfectly safe until you actually observe it, whereupon its notional security collapses into paranoid doubt.It’s as if Schrodinger opened his famous box containing a cat that was...


Tags: internet, social media

RSSSubscribe to this blog

Egypt's mysterious return to the Internet


The old media look to a square in Cairo when they want to understand the political turmoil in Egypt, but perhaps it is now the Internet, or the lack of it, that offers a more complex picture of the power...


Tags: internet

RSSSubscribe to this blog

IPv4 is nearing the end but don't panic


Internet engineers have been fussing over the imminent shortage of IPv4 addresses for most of the last decade, and people have ignored them in the face of high upgrade costs. But might the countdown really be starting on the last...


Tags: internet

RSSSubscribe to this blog

Android rises, Nokia falls. But consumers need Windows as a third way


The latest Canalys smartphone figures show Android starting to dent its rivals, but you don’t have to stare too closely at the figures to see that some of them are not so much being bumped around as pummelled.Attention has focused...


Tags: blackberry. android, iphone, smartphone, windows 7

RSSSubscribe to this blog

AOL search burrows into Firefox


Should getting rid of unwanted software be this hard? Installing an update to AOL’s perfectly servicable IM software recently I selected not to use AOL as my default search client or install its equally redundant toolbar app during the update.After...


Tags: google search, search engine

RSSSubscribe to this blog

Do Internet users really search for Porn at Christmas?


Internet users scour the Internet for porn during the Christmas period, or at last that’s what one security company has claimed.According to antivirus company ESET, running the search term ‘porn’ through Google Trends reveals a rising tide of searches since...


Tags: google search

RSSSubscribe to this blog

China did not built the 'great firewall' on its own


The man seen as the architect of the most powerful censorship system ever built, the ‘great firewall of China’ or 'golden shield', has had to take down his own blog after seeing it attacked by frustrated Internet users in his...


Tags: firewall, snooping, surveillance

RSSSubscribe to this blog

The FBI OpenBSD 'back door' and other encryption conspiracies


The philosophical flaw of security back doors is that they are usually pretty easy to spot. There are also much easier ways to defeat encryption which has rendered the back door idea moot.  Intriguing to read, then, the sensational claims...


Tags: encryption

RSSSubscribe to this blog

Previous [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] ... [42] continued on page 9 >>

Techworld White Papers

Optimising data protection for virtual environments

VM environments require the same level of data protection as does the physical server environment. Companies may use data protection tools built for the physical environment in the virtual world, but this has serious disadvantages.

Download Whitepaper

PCI Compliance: Are UK businesses ready?

Exploring the results of a recent survey, including: ? Levels of understanding of the standard ? Current perceptions of actual compliance status ? Attitudes toward addressing compliance

Download Whitepaper

Mobility Management for Dummies

Your complete guide to managing and securing mobile devices such as laptops and smartphones.

Download Whitepaper

Magic Quadrant for midrange and high-end NAS solutions

It is difficult to find one midrange or high-end NAS product that can cater to all needs. File systems embedded in NAS are often designed to solve one major pain point, with additional features being added later to broaden use cases and benefits.

Download Whitepaper

Techworld UK - Technology - Business

Oracle Video

Enabling agile and intelligent businesses

 Changing markets, competitive pressures and evolving customer needs are placing increasing pressure on IT to deliver greater flexibility and speed. Explore truly flexible SOA foundations with this Oracle video.

Watch
COLT White Paper

IT Misuse Survey

Complete this survey and you could win a Nexus One

Techworld are running a short survey to discover how UK businesses are managing Internet and email misuse in the Enterprise.

Complete Survey

Complete our survey and you could win a Sony E-book Reader.
Techworld have teamed up with HP to compile a survey relating to server virtualisation. Complete the short survey and you could be the lucky winner of a Sony E-book reader.

Complete the survey here

Site Map

Test