Maybe you didn't get the memo: Tomorrow marks the end of patches for Windows XP Service Pack 2 (SP2).
Earlier this week was Microsoft's Patch Tuesday for June--a busy Patch Tuesday with ten new security bulletins fixing 34 different vulnerabilities. However, there is now a publicly disclosed vulnerability with potentially dire consequences that didn'...
With the 2010 FIFA World Cup set to kick off at the start of June, anti-spyware company Lavasoft has compiled a list of the top online traps to look out for.
A new, incredibly sneaky identity-theft tactic surfaced earlier this week when Mozilla's Aza Raskin, the creative lead of Firefox, unveiled what's become known as "tabnapping."
We've been talking about Facebook's privacy mess for days now. We all know the story, right? Privacy controls are broken, everyone's getting irritated, Facebook's not too concerned, blah flippidy-freakin' blah.
In 2003, author and security pioneer Simson Garfinkel conducted a study of data he found on second-hand hard drives. On eBay, Garfinkel bought the hard drive from an old ATM machine; it held 827 bank account PINs. Another drive he purchased on eBay h...
LAS VEGAS -- Corporations should institute daily one-minute Internet safety lessons that users must complete before they are allowed online, a security expert told Interop attendees this week, but he said even that might not work because attackers pa...
Protecting your privacy on Facebook can feel like a full-time job. The social network has made a habit of tweaking its privacy policies with some regularity -- and in many cases, it's up to you to take proactive steps in order to keep your info out...
Windows 7 has been warmly received and swiftly adopted by businesses, with the result that many IT admins are now struggling with the platform's new security features. In addition to changes to User Account Control, BitLocker, and other features inhe...
A reader asked if it's really a good idea to supplement your regular antivirus program with something like SuperAntiSpyware or Malwarebytes Anti-Malware. I've recommended doing just that in the past.
A reader asked the Answer Line forum how she can remove a Trojan from an infected .dll file called infamiqayoq.dll. Her security software quarantined the file, but now she gets an error message every time she boots.
A reader asked the Answer Line forum if it's safe to work, say, on a Microsoft Word document, while scanning for malware.
There's nothing pretty about software overburdening your CPU and slowing everything down. And finding and fixing the cause isn't always an easy task. These suggestions will hopefully help.
If you've heard of Google Buzz, chances are you've also heard about some of the privacy concerns that surround it. The social media service offers some cool ways to share photos, links, status messages, and more with fellow Google Buzz users. But if ...
If you have a Linksys model WRT160N or Netgear RP614v4 router, it may be time to worry a little. At least according to a report out of Defcon from The Register. The vulnerability is based on CSRF, or cross-site request forgery, an issue with the cPan...
Most Popular Reviews
- 1 Huawei P9 review: lifting photography to another level... sometimes.
- 2 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 3 D-Link Taipan AC3200 Ultra tri-band modem-router review
- 4 Dell XPS 13 (2016) review: Making the very best Ultrabook
- 5 Microsoft Surface Book review: The verdict on Microsoft's first notebook
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- Facebook Messenger flaw revealed
- Synaptics's low-cost USB fingerprint reader could bring Windows Hello to old PCs
- Microsoft breaks own design rules in dupe-the-user Windows 10 upgrade tactic
- No more passwords with Google's Trust API
- There’s finally reason to hope in the war against ransomware
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
- CCBiztalk developerNSW
- CCIntegration ArchitectACT
- CCSales Specialist - DigitalNSW
- CCSalesforce Technical Business AnalystNSW
- CCSystems Engineer / Applications Scripting DeveloperSA
- CCSharepoint ConsultantQLD
- CCChange Manager, Digital ProgramNSW
- FTTechnical/Solutions ArchitectNSW
- CCSolution Architect / Designer - Cyber SecurityNSW
- CCProgram DirectorNSW
- FTIT Service Desk AnalystNSW
- FTSolution ArchitectVIC
- FTSOE Engineer - End User ComputingQLD
- FTProject Coordinator / AdministratorNSW
- CCTelecommunications Operations Support officerACT
- CCJunior PM/ConsultantACT
- FTDevelopment/Architect Capability ManagerVIC
- CCIT Change Manager - Western SydneyNSW
- CCSenior Project Coordinator - Large Telco - URGENTNSW
- FTSolution Architect - Data/ InformationVIC
- CCRelease & Configuration Manager | Defence intelligence application | NV1 clearedACT
- FTFull-Stack .NET DeveloperVIC
- FTIT Project Coordinator- Data Center Infrastructure backgroundNSW
- CCLevel 1 & 2 Helpdesk (Need SAP, ERP system experience)NSW
- CCContract Programmer (JAVA/J2EE/SQL) 160628/P/133Asia