Follow Us

War on Error

Recent Posts

The '10-10-10' virus that wasn't. Are we afraid of binary numbers?


The human mind is fixated with the idea of connecting dates to expected disaster, the better to make the random comprehensible. A neat example of this phenomenon was the recently rumoured ‘10-10-10’ virus, that didn’t strike at 10.10am on 10...


Tags: 10-10-10 virus, 10.10.10 virus, michelangelo virus, y2k

RSSSubscribe to this blog

Ban Adobe's PDF? The craziest idea of the year


Is Adobe’s PDF document standard now so riddled with security problems that the time has come to ditch it?According to an unscientific straw poll conducted at the recent Virus Bulletin 2010 conference in Vancouver, the answer is an emphatic ‘yes’,...


Tags: adobe reader, pdf, security

RSSSubscribe to this blog

Birmingham branded software's 'illegal piracy hotspot'


What did the city of Birmingham do to get itself into the bad books of the Business Software Alliance? It turns out that according to the BSA’s own figures, the city is the UK’s top ‘illegal piracy hotspot’ accounting for...


RSSSubscribe to this blog

The Zeus bank Trojan is stealing money with impunity. Can it be stopped?


It’s been called the ‘second bank crisis’, and this time the cause is a piece of malware so potent it can steal money from online bank accounts with apparent impunity. It’s name is Zeus (or Zbot) and it’s mighty...


Tags: online banking, security, zbot, zeus trojan

RSSSubscribe to this blog

Man jailed for planting child porn on colleague's laptop


There are two shocking aspects to the case of the London handyman who tried to frame his school caretaker boss  using planted child porn images. First, that it happened at all, second, that it took four years of hell for...


RSSSubscribe to this blog

Xerox PARC, where technology suddenly turned 'personal'


The fabled Xerox Palo Alto Research Centre (PARC) celebrates its official 40th anniversary this month, another opportunity for a grateful industry to ask the relevant question: where did it all go right?PARC, as any student of IT will know,...


RSSSubscribe to this blog

'Here you have' worm - email security fails again


Is ‘Here you have’ a worm, a virus or perhaps a cleverly-disguised Trojan? A quick look at its design and it’s clear that it is, sneakily, all three rolled into one, and that is perhaps what is so intriguing about...


RSSSubscribe to this blog

Google needs better Adwords vetting


Some months ago we reported on the frighteningly simple US visa scam in which fraudsters were charging up to $60 for US ESTA (Electronic System for Travel Authorization) visa registrations that cost nothing from the official site. Now we hear...


RSSSubscribe to this blog

Gmail's 'priority inbox' - more evidence that corporate email is obsolete


Google has started rolling out a new Gmail feature which automatically prioritises incoming email into categories its believes reflect each message’s importance to the receiver. The most important messages are tagged ‘Important’ and arranged at the top of the inbox,...


RSSSubscribe to this blog

The US cyberstrategy 3.0 risks starting Cold War 2.0


It started with a single infected USB flash drive delivering targeted malware to US military and intelligence systems and has ended up launching the latest major rethink of US cybersecurity.According to an account offered recently by US Deputy Secretary of...


RSSSubscribe to this blog

Previous [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] ... [40] continued on page 10 >>

Techworld White Papers

Optimising data protection for virtual environments

VM environments require the same level of data protection as does the physical server environment. Companies may use data protection tools built for the physical environment in the virtual world, but this has serious disadvantages.

Download Whitepaper

PCI Compliance: Are UK businesses ready?

Exploring the results of a recent survey, including: ? Levels of understanding of the standard ? Current perceptions of actual compliance status ? Attitudes toward addressing compliance

Download Whitepaper

Mobility Management for Dummies

Your complete guide to managing and securing mobile devices such as laptops and smartphones.

Download Whitepaper

Magic Quadrant for midrange and high-end NAS solutions

It is difficult to find one midrange or high-end NAS product that can cater to all needs. File systems embedded in NAS are often designed to solve one major pain point, with additional features being added later to broaden use cases and benefits.

Download Whitepaper

Techworld UK - Technology - Business

Oracle Video

Enabling agile and intelligent businesses

 Changing markets, competitive pressures and evolving customer needs are placing increasing pressure on IT to deliver greater flexibility and speed. Explore truly flexible SOA foundations with this Oracle video.

Watch
COLT White Paper

IT Misuse Survey

Complete this survey and you could win a Nexus One

Techworld are running a short survey to discover how UK businesses are managing Internet and email misuse in the Enterprise.

Complete Survey

Complete our survey and you could win a Sony E-book Reader.
Techworld have teamed up with HP to compile a survey relating to server virtualisation. Complete the short survey and you could be the lucky winner of a Sony E-book reader.

Complete the survey here

Site Map

Test