Stephane Herry says that he founded his private file-sharing network GigaTribe out of frustration at not being able to share files with his friends on Kazaa. Every time he searched for a file that he knew a friend had uploaded, he saw only similar fi...
Do you trust Google? If you use its multitude of online services on a daily basis you might, but is that assumption wise? For some, Google is a wonderful company with a broad selection of useful online tools that make life easier, but for others Goo...
In 1989, Eugene Kaspersky ran afoul of the Cascade virus while working for the Ministry of Defence in the heart of the Soviet Union. He defeated it with his wits and a pencil.
China did a sudden about-face late yesterday and decided to delay its controversial requirement that all computers sold after July 1 must come with Web filtering software.
Open source security is a hot topic in the IT world. Some people believe that open source solutions are a potential playground for mischief-makers and cyber criminals, while others swear they’re safer than proprietary software.
Today more than ever, good network security is vital to businesses of all sizes. Cybercriminals, equipped with sophisticated software that automates the task of seeking out vulnerabilities, aren't focusing on large enterprises alone; any easy target ...
With all the outrage over The Pirate Bay going legit, I think it's time to reconsider the merits of illegally media sharing. The world has changed since Napster introduced peer-to-peer file sharing in 1999, and the culture that made the practice seem...
The Pirate Bay, a torrent site that has attracted millions of users by offering a wealth of (often illegal) content, is now at a turning point. With a $3.8 million fine dangling around the neck of the owners and a fresh $7.8 million acquisition by Gl...
Ah, the Internet cafe, home to yuppies, flavored lattes, and The Pirate Bay? If you haven't heard, Swedish Internet cafe operator, Global Gaming Factory X, today bought The Pirate Bay for $7.8 million. The new owner says it intends to sail The Pirat...
Sometimes, it seems scams are becoming almost as common as social media experts on Twitter. The latest one, unleashed Monday morning and initially noticed by tech blog Mashable, centers on a fake blog hosted at the domain twittersblogs.com. Tweets co...
Forget spam and phishing as you once knew it: the new breed of cyber criminals are shifting their operations to fertile new fields, including mobile phones, online gaming and Web 2.0. These are the chief threats facing consumers today, and it's peril...
Sweden's Pirate Party won 7.13 percent of the vote in elections earlier this month. Its campaign for the respect of privacy, the reform of copyright law and the abolition of the patent system earned it a seat in the European Parliament, and it may ye...
An overwhelming majority of Web sites promoted through spam are hosted in China at service providers that many times choose to ignore complaints and allow illegal activity, according to research from the University of Alabama.
A new product from Phoenix Technologies, <a href="http://www.phoenixfreeze.com/">called Freeze</a>, lets you use BlackBerry or iPhone Bluetooth to tell a PC that you're leaving the area and want it to lock up. When you return, Phoenix Freeze can also...
McAfee is expanding its staff in China amid a boom in the country's security market fueled by the launch of next-generation mobile networks.
Most Popular Reviews
- 1 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 2 D-Link Taipan AC3200 Ultra tri-band modem-router review
- 3 Dell XPS 13 (2016) review: Making the very best Ultrabook
- 4 Microsoft Surface Book review: The verdict on Microsoft's first notebook
- 5 Telstra Wi-Fi 4GX Advanced III review: Testing the world's first 600Mbps wireless hotspot
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- Govt working to tackle ‘challenges’ presented by encryption
- The FBI paid more than $1 million to hack the San Bernardino iPhone
- Turnbull launches government's cyber security strategy
- Adobe on QuickTime: You're up the creek without a paddle
- Hacker: This is how I broke into Hacking Team
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
- CCSenior Project Manager, Technology Upgrade & RefreshNSW
- CCLead Administrator - Network and SecurityNSW
- CCTest Analyst - Contact Centre TechnologiesVIC
- FTSoftware Design Engineer (Embedded Software)SA
- CCContract Analyst Programmer (JAVA/Oracle/Unix) 160509/AP/395Asia
- FTData AnalystNSW
- CCSolution Architect / Data ArchitectNSW
- CCSenior IT Business AnalystVIC
- FTSolution Architect (Guidewire Billing Center)NSW
- CCSAP BASIS ConsultantVIC
- CCSenior ICT Project OfficerACT
- CCWindows Server EngineerNSW
- CCTechnical WriterACT
- CCSenior Project Manager - HealthcareVIC
- CCSharepoint DeveloperVIC
- FTSharePoint DeveloperSA
- CCSenior Master Data OfficerNSW
- CCPMO Coordinator- Prince2, Project financialsNSW
- CCJava Developer- 12 month contractNSW
- CCApplication Migration ArchitectACT
- FTSenior Middleware Lead Shared Services (Support and EngineeringVIC
- FTFront End DeveloperVIC
- CCSenior Business Analyst - Data ManagementNSW
- CCApplication Solution ArchitectNSW
- FTSenior DBA / Team LeadVIC