Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

SECURITY

How-tos

Latest Security articles


Google’s 2-Step Verification – why everybody should turn this on now

Google has announced 2-Step Verification using a USB Security Key. But what is 2-Step verification and should more people use it?

How you can stop spear-phishing

Inbound email sandboxin, real-time analysis of web traffic and much, much more

How to gain access to an old PC without the logon password

This technique is not well known, but it's relatively simple

How to send sensitive information over email

Need to share some private data but don't want to risk a hack attack? Read on

Three ways you can avoid getting hacked like Yahoo!

Hackers breached Yahoo and exposed more than 450,000 passwords, but Yahoo is to blame for making it easy

How to protect yourself from DNSChanger

Here's how to determine whether you're infected, and what to do if you are.

16 expert OpenSSH hacks

So you think you know OpenSSH inside and out? Test your chops against this hit parade of 16 expert tips and tricks

How to create different, secure and easy-to-remember passwords for every site

Need an easy way to generate and manage your passwords? Here's a simple trick that requires no special software

What an Internet cyber thief is doing and how to catch them

The situation today with extremist groups using high-tech hacking and bots "isn't out of hand", but it could quickly get worse

How to secure your Android smartphone

With Android malware on the rise, here's how to protect your device from infection

How to protect online transactions with multi-factor authentication

Organisations in the US are now affected by federal guidelines recommending multiple layers of security controls

How to stay safe online while grabbing bargains on Cyber Monday

If you're planning on letting your fingers do the shopping on Monday, here are five tips to help you stay safe

How to hack your way into Facebook's new Timeline

Use this workaround to disguise yourself as a developer and gain early access to the newest version of Facebook

How to temporarily disable Microsoft Security Essentials

Think your anti-virus program is causing a conflict with some other program? Here's how to switch it off for temporary troubleshooting

How to recognise and defeat website malware

Back-up, update, have tough passwords, harden your server - there is much you can do

Security woes: How to defend against malnets

Malnets are extensive distributed network infrastructures embedded in the Internet, but there is something you can do

Will tech companies ever figure out how to deal with passwords?

CIOs should worry about seeing their companies targeted, hacked and eventually vilified in the press

How to encrypt your Apple or Android tablet

Thinking about encrypting your Apple or Android tablet? The process can be daunting, but here's how to do it.

How to secure your BIOS

You've password-protected your computer, but it remains vulnerable to mischief until you've done the same for your BIOS

How to preserve your privacy on Facebook - be savvy

Here are a few tips to help you enjoy social networking and not worry about interfering with your ability to land that perfect job

Four ways for you to control your Google Privacy

Google's new privacy policy reportedly breaches privacy in Europe and the US - so what are you going to do about it?

Five reasons why you should host your own email

There are good reasons to keep your business' email on your private server instead of outsourcing it

Four ways to protect your intellectual property

Data breaches are going down but stealing IP is on the rise. Here's how to stop it happening to you

How to manage information security during an innovation void

Advice for infosec executives on turning possible crisis into an opportunity

How to recover a lost phone, tablet or laptop

These terrific tools and tips can rescue your wayward mobile devices and keep your personal data out of criminals' hands


Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map