So far 2010 hasn't been kind to the Microsoft Internet Explorer Web browser. It is only March, and Microsoft is releasing the second emergency out-of-band patch to respond to a zero-day exploit in the wild.
Although some like to say "antivirus is dead" because of the explosion in malware that makes signature-based desktop protection harder than ever, start-up Immunet wants to bring new life to antivirus scanning through cloud computing.
A security researcher has published exploit code for the latest Internet Explorer zero-day flaw on the Web and Microsoft is warning that more attacks against the unpatched vulnerability can be expected in-the-wild. One thing seems to be more apparent...
Cybercrime is becoming an ever increasing threat.
This past January, the health organisation Kaiser Permanente reported a theft of an external hard drive from an employee's car. The hard drive contained data on about 15,500 Northern California patients, including their full names, medical record n...
Lock down your PC.
Quick: What's a hacker? A pimply faced teenager in a dark bedroom trying to start World War Three, or a thirty-something professional with mad computer skills?
Dear Facebook, I appreciate your service. I really do.
No one likes to be hated, but if you're running a small business, sometimes you've got to take security measures that will make your employees really angry. You might even have to (gasp) pull some PCs off the Internet, and treat some employees like, ...
Laptop computers have become mobile stores of massive amounts of information. Add to that the proliferation of removable hard drives, and it becomes crystal clear how much sensitive data is on the move in the world, most of it woefully underprotected...
Kaspersky Lab may not be a household name in the United States, but in some parts of the world, it's the most popular consumer antivirus software. In China the company boasts 100 million users, and the software is also popular in Germany, and, of cou...
Do you know how to guard against scareware? How about Trojan horse text messages? Or social network data harvesting?
About two weeks after Google publicly squared off with the Chinese government, the world is still watching for the search company's next step.
If you think spam attacks were bad in 2009, just wait until 2010 gets going.
Rootkits, a type of stealth technology used by malware malefactors, attempt to hide in the dark corners of an infected PC and evade detection. A new post out today from the Microsoft Malware Protection Center shines the spotlight on the evil tools.
Most Popular Reviews
- 1 Kogan Agora 4G Pro review: the final word on Kogan's best smartphone
- 2 Sony Xperia Z4 Tablet (LTE) review: The tablet of choice for anyone on Android
- 3 Bose SoundLink Mini II Bluetooth speaker review
- 4 Apple MacBook Air 2015 review: Only better with time
- 5 Lenovo ThinkPad T550 laptop
Join the PC World newsletter!
Deals on PC World
- Networking, Wireless & VoIP
Deals on PC World
Latest News Articles
- Hackers figure out how to seize control of a car from anywhere
- Winners of our ESET Antivirus competition announced
- Vulnerability found in Samsung smartphone keyboard
- Mac users exposed by zero-day vulnerability
- Breaking Bad-themed crypto-ransomware hits Australian computers
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
- FTSenior Network EngineerNSW
- CCMarketing Coordinator - World's largest search engine!NSW
- FTDevOps Consultant - Microsoft Experience - Digital ConsultancyVIC
- FTDesktop Engineering ManagerNSW
- FTBusiness Development Manager & Account ManagerVIC
- CCAccount Strategist | Sales Executive | Global Search EngineNSW
- FTTechnical Sales Support Representative - The Worlds largest Search Engine!NSW
- CCLead Generator - Software SolutionsNSW
- FTField EngineerNSW