Guy Matthews
First wave of MP3 spam targets unwary music fans

Security
First wave of MP3 spam targets unwary music fans
MP3 files posing as pop music clips show that spammers are trying new ways to lower people's guard
31 Oct 2007
Microsoft's SOA catch-up draws faint praise

Business strategy
Microsoft's SOA catch-up draws faint praise
Project Oslo kicks off as Microsoft makes a raft of announcements to boost its stake in service-led architectures.
31 Oct 2007
Banks lose favour with IT contractors

Network & Internet
Banks lose favour with IT contractors
IT contractors are losing faith in the financial services sector in favour of boom markets like construction and the public sector, says a report.
31 Oct 2007
Macabre malware makes Halloween scary

Network & Internet
Macabre malware makes Halloween scary
A gang of malware propagators is using Halloween to lure PC users into responding to malicious spams, warns a security firm.
31 Oct 2007
Porn images 'encouraging response to spam'

Security
Porn images 'encouraging response to spam'
An image of a stripping woman is being used to get unwary PC users to answer spam messages.
30 Oct 2007
Enterprises 'face major threat from bot armies'

Security
Enterprises 'face major threat from bot armies'
Botnet operators are turning their attentions away from just recruiting consumer PCs, and are finding new ways to infiltrate enterprises
30 Oct 2007
Doubts cast on InfiniBand as data centre saviour

Network & Internet
Doubts cast on InfiniBand as data centre saviour
With many vendors now backing InfiniBand as the best way to simplify data centre management, doubts are being raised in some quarters.
30 Oct 2007
Poor file management courts disaster, says report

Network & Internet
Poor file management courts disaster, says report
New research says that many organisations are facing serious consequences from poorly filed information being passed around and used unwittingly.
30 Oct 2007
Tape vs Disc - the new battle

Server & storage
Tape vs Disc - the new battle
The debate about whether tape storage can compete with a disk-only back-up solution is as hot as ever. We talk to two senior pros to find where they s…
18 Oct 2007
The benefits of SAN

Server & storage
The benefits of SAN
The first commercially available storage area network (SAN) hit the market nearly 10 years ago. But the cost of adopting a networked storage solution …
18 Oct 2007
Dealing with disaster recovery

Investment Management
Dealing with disaster recovery
IT PRO talks to IT managers to get their views on the growing importance of disaster recovery provisions, and to find how their own recovery strategy …
20 Sep 2007
Academic claims contactless payments pose data security risk

Security
Academic claims contactless payments pose data security risk
With the number of trials of contactless payment cards groing, a leading academic security researcher has raised concerns over the level of data secur…
4 Jul 2007
Anti-piracy tactics backfiring

Business strategy
Anti-piracy tactics backfiring
Businesses claim that heavy-handed tactics to expose unlicensed use of software, including offering rewards and incentives to inform on offenders, wil…
4 Jul 2007
Work life balance being hurt by online surfing

Network & Internet
Work life balance being hurt by online surfing
Research shows that participation in leisure pursuits is being hit by the increasing use of the internet for information gathering and entertainment.
4 Jul 2007
The Wireless Event: WiMax players don't understand customer

Mobile
The Wireless Event: WiMax players don't understand customer
Not enough players involved in the WiMax world really get where customers are coming from, according to an expert working in this technology area for…
24 May 2007
The Wireless Event: FMC reality still far from the vision

Mobile
The Wireless Event: FMC reality still far from the vision
Fixed mobile convergence has come a long way but it still has a long journey ahead of it before the theory become reality.
24 May 2007
The Wireless Event: Businesses will still need in-building

Mobile
The Wireless Event: Businesses will still need in-building
Large companies will find external WiMax systems alone too expense so vendors must also offer them dedicated in-building systems to compensate, says R…
24 May 2007
IP telephony services accused of freeloading

Network & Internet
IP telephony services accused of freeloading
Services such as Skype benefit from multi-million pound investments in infrastructure made by mobile operators yet make no contribution, industry figu…
4 May 2007
Managing Bluetooth at work: Part 2

Mobile
Managing Bluetooth at work: Part 2
In the second part of this feature series, we look at how you can harness Bluetooth to work for your business and identify some of the sectors where i…
3 May 2007
US spyware clampdown won't impress European governments

Security
US spyware clampdown won't impress European governments
UK legal expert claims that efforts in the US to combat the growth of spyware are unlikely to influence European moves to tackle the problem.
3 May 2007
Drift to contracting is impacting skill levels

Network & Internet
Drift to contracting is impacting skill levels
A move to freelance status gives short term financial gain, but reduces knowledge levels long term.
2 May 2007
Banks 'leaking secret data via poorly secured Wi-Fi

Network & Internet
Banks 'leaking secret data via poorly secured Wi-Fi
City Internet cafes are a potential mecca for corporate information spies.
2 May 2007
Collaboration between police and businesses needed 'to stem

collaboration
Collaboration between police and businesses needed 'to stem
Organised criminals in the UK are relying on a lack of partnership between public and private sectors, says an expert.
2 May 2007
Users must guard against shoulder surfing

Network & Internet
Users must guard against shoulder surfing
People are no longer looking over your shoulder just to be nosey, they could also be doing so to get a glimpse at your corporate data warns 3M.
2 May 2007
Companies "too dependent" on mobile technology

Network & Internet
Companies "too dependent" on mobile technology
Security experts berates companies that have become hooked on their BlackBerrys and other mobile devices.
1 May 2007
Surge in password-protected malware

Security
Surge in password-protected malware
Experts warn of viruses travelling in password-protected zip files.
30 Apr 2007
Infosecurity Europe 2007: Only tenth of companies have

Security
Infosecurity Europe 2007: Only tenth of companies have
New survey finds that only nine per cent of UK companies have policies to govern use of encryption in the enterprise.
25 Apr 2007
Infosecurity Europe 2007: Security no longer wedded to IT

Security
Infosecurity Europe 2007: Security no longer wedded to IT
Security is increasingly likely to end its marriage with IT to go professional, according to research published this week.
24 Apr 2007
Infosecurity 2007: Security will be key to MiFID success

Network & Internet
Infosecurity 2007: Security will be key to MiFID success
Security will be fundamental to successful MiFID implementations, but the costs incurred as a result will not be small.
24 Apr 2007
Businesses still failing to encrypt sensitive data

Network & Internet
Businesses still failing to encrypt sensitive data
Sixty per cent of large businesses do not adequately secure data leaving their organisation.
30 Mar 2007
Mobile operators unite to simplify roaming

Mobile
Mobile operators unite to simplify roaming
Collaboration between mobile phone network operator groups in Europe and Asia will help simplify cross-network roaming services and pricing.
30 Mar 2007
Sat nav systems at risk from hackers

Mobile
Sat nav systems at risk from hackers
In-car route-planning equipment could be the next target for hackers after researchers expose wireless data vulnerability.
29 Mar 2007
Wireless at the Coalface: Part 2

Mobile
Wireless at the Coalface: Part 2
IT PRO talks to IT managers in the public sector about their views on current wireless technology, and their hopes for its future development.
29 Mar 2007
RFID open to criminal abuse

Mobile
RFID open to criminal abuse
From triggering bombs to faking passports, report exposes the flaws in this emerging technology.
28 Mar 2007
ID theft up on renewed malware attacks

Security
ID theft up on renewed malware attacks
New phishing and malware attack strategies, coupled with increased volume has caused IT theft incidents to spike, study reveals.
28 Mar 2007
Managing Bluetooth at work: Part 1

Mobile
Managing Bluetooth at work: Part 1
The proliferation of phones, PDAs, computers and other devices that support and use Bluetooth wireless networking technology has created another heada…
5 Mar 2007