News MP3 files posing as pop music clips show that spammers are trying new ways to lower people's guard
News A gang of malware propagators is using Halloween to lure PC users into responding to malicious spams, warns a security firm.
News An image of a stripping woman is being used to get unwary PC users to answer spam messages.
News New research says that many organisations are facing serious consequences from poorly filed information being passed around and used unwittingly.
In-depth The debate about whether tape storage can compete with a disk-only back-up solution is as hot as ever. We talk to two senior pros to find where they stand on the debate as they battle with information overload in two very different sectors.
In-depth The first commercially available storage area network (SAN) hit the market nearly 10 years ago. But the cost of adopting a networked storage solution restricted take up to a handful of major organisations, leaving most to muddle on with a direct attached storage model, but that's all changed now.
In-depth IT PRO talks to IT managers to get their views on the growing importance of disaster recovery provisions, and to find how their own recovery strategy has evolved.
News With the number of trials of contactless payment cards groing, a leading academic security researcher has raised concerns over the level of data security in place to safeguard sensitive information during the transaction.
News Businesses claim that heavy-handed tactics to expose unlicensed use of software, including offering rewards and incentives to inform on offenders, will do nothing to change behaviour.
News Research shows that participation in leisure pursuits is being hit by the increasing use of the internet for information gathering and entertainment.
News Large companies will find external WiMax systems alone too expense so vendors must also offer them dedicated in-building systems to compensate, says Red-M.
News Services such as Skype benefit from multi-million pound investments in infrastructure made by mobile operators yet make no contribution, industry figures argue.
In-depth In the second part of this feature series, we look at how you can harness Bluetooth to work for your business and identify some of the sectors where it appears to be making inroads in the enterprise.
News People are no longer looking over your shoulder just to be nosey, they could also be doing so to get a glimpse at your corporate data warns 3M.
News Security is increasingly likely to end its marriage with IT to go professional, according to research published this week.
News Sixty per cent of large businesses do not adequately secure data leaving their organisation.
News Collaboration between mobile phone network operator groups in Europe and Asia will help simplify cross-network roaming services and pricing.
News In-car route-planning equipment could be the next target for hackers after researchers expose wireless data vulnerability.
In-depth IT PRO talks to IT managers in the public sector about their views on current wireless technology, and their hopes for its future development.
News From triggering bombs to faking passports, report exposes the flaws in this emerging technology.
In-depth The proliferation of phones, PDAs, computers and other devices that support and use Bluetooth wireless networking technology has created another headache for IT managers trying to manage wireless data services in the enterprise.
In-depth IT PRO talks to IT managers in a range of organisations about their views on current wireless technology, and their hopes for its future development.
Tutorials Managing mobile devices and the flow of mobile data remains one of the most daunting tasks for the network manager. IT PRO shows you how you can use Afaria from iAnywhere to simplify the process.