All the latest UK technology news, reviews and analysis



Tumblr rolls out two-factor authentication security upgrade

Works to protect users from account-hijacking hackers


Palo Alto Networks pays $200m for endpoint security firm Cyvera

Promises combination of technologies will offer holistic security from networks to endpoints, to the cloud

AVG Link Scanner in action

AVG LinkScanner 2014 v14.0.4354

Check for rogue or malicious websites

AVG Anti-Virus Free 2014 v14.0.4354

Major update to the impressive and free antivirus package

Android smartphones and tablets could be bricked by security flaw

Security researchers uncover exploit in all Android versions, including 4.0 and above

Malwarebytes pledges to protect Windows XP users after support cut-off

Security vendor warns that many customers are still using the decade-old operating system

US hacked servers at Chinese firm Huawei and scoured email database

Relations between top nations could be about to sour over hacking revelations

The Internet of Things is too valuable to let privacy concerns impact uptake

Users need to choose products from vendors that offer proper data protection, says V3 editor Madeline Bennett

Microsoft defends ability to access Hotmail and Outlook data

Firm claims case of insider leaking info warranted measures

Turkey blocks Twitter but users find workarounds

Latest censorship threat to communications tools amid protests

Hackers turning to Tor network to hide evolved malware, warns Kaspersky Lab

ChewBacca and evolved Zeus attacks are only the beginning

PRISM: Top NSA lawyer claims Google, Yahoo and Facebook knew of spy campaign

Companies knew exactly what data the agency collected

IBM launches Red Cell big data fraud squad

Big Blue takes fraud into the red with new software and services

ICO fines Kent Police £100,000 for leaving interview tapes in old offices

Force failed to secure confidential information during headquarters reshuffle

Hackers besiege PHP sites with 30,000 attacks hitting patched exploit

Remote code execution levels rocket after vulnerability disclosure

Europe must lead big data ‘gold rush’

Neelie Kroes urges region to tackle privacy and security challenges head on

Hackers hit Unix servers to send 35 million spam messages a day

Operation Windigo campaign active for at least two years, say ESET security researchers

Student wins 2014 Cyber Security Challenge as UK seeks top IT talent

Teenager beats 41 finalists to the prize in hacker-busting masterclass

WinPatrol 30.5.2014

Proactively protect your system

Hotspot Shield 3.35

Create a secure WIFI connection

Nato websites overwhelmed by Ukrainian hacktivists' DDoS attack

Group of hackers claim responsibility for high-profile attack

Popular Threads

Powered by Disqus
Galaxy S5 vs One M8 video review

Galaxy S5 vs HTC One M8 video review

We see which Android contender is best for business

Updating your subscription status Loading

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button

Data protection: the key challenges

Deduplication is a foundational technology for efficient backup and recovery


iPad makes its mark in the enterprise

The iPad can become a supercharged unified communications endpoint, allowing users to enhance their productivity

Java Developer Clojure Android - Start-up

Java Developer / Software Engineer (Android Cloud Clojure...

Practice Manager

At Lloyds Banking Group our vision is to be the best...

IT Project Manager Derby

IT PROJECT MANAGER | Derby The Company A multi-service...

CNC Operator/Setter - Automotive

Classic CNC Operator role for anyone who has experience...