Antivirus vendor Avast Software has agreed to buy rival AVG Technologies for US$1.3 billion in cash.
Malwarebytes said it may take three to four weeks to fix flaws in its consumer product found by Google security researcher Tavis Ormandy.
A banking trojan, known for its small size but powerful capabilities, has expanded the number of financial institutions it can collect data from, according to security vendor Avast.
A type of malware called Reveton, which falsely warns users they've broken the law and demands payment of a fine, has been upgraded with powerful password stealing functions, according to Avast.
It's generally accepted that antivirus programs provide a necessary protection layer, but organizations should audit such products before deploying them on their systems because many of them contain serious vulnerabilities, a researcher warned.
Victims of Simplocker, the first file-encrypting ransomware threat for Android devices, can recover files without paying cybercriminals because the malicious program uses a hardcoded encryption key.
Prague-based antivirus company, Avast, said, on Monday, it took its community forum offline after a data breach, but payment information was not compromised.
Fresh statistics from the maker of a widely used free security product show the extent to which users are encountering file-encrypting malware known as ransomware.
Microsoft has toughened its criteria for classifying programs as adware and gave developers three months to conform with the new principles or risk having their programs blocked by the company's security products.
A new piece of information-stealing malware that appeared earlier this year has been rapidly gaining traction during the past few weeks, with hundreds of infection attempts being detected every day by antivirus vendors.
Although the number of malicious browser extensions has significantly increased in the past year many security products fail to offer adequate protection against them, while others are simply not designed to do so, according to a security researcher.
An analysis of a piece of Android spyware targeting a prominent Tibetan political figure suggests it may have been built to figure out the victim's exact location.
Security researchers warn that cybercriminals have started using Java exploits signed with digital certificates to trick users into allowing the malicious code to run inside browsers.
The website for Reporters Without Borders was booby-trapped to deliver malicious software using the latest Java and Internet Explorer vulnerabilities, security vendor Avast said on Tuesday.
(Writer's Comment: Starting today, Bugs and Fixes will be posted biweekly each month for your convenience. You'll still be able to read the Bugs and Fixes column in the monthly print issue of PCWorld.)
Most Popular Reviews
- 1 Witness a 241% Australian price hike: Dell Latitude 7370 review
- 2 Is this the best value phone on the market? Moto G4 Plus review
- 3 Sony Xperia X Performance review: Sony’s most disappointing product in years
- 4 Huawei P9 review: lifting photography to another level... sometimes.
- 5 Huawei Mate 8 review: probably the best all-round Android phone you can buy
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- Intel is developing AR smart glasses for interactive collaboration
- Kimpton Hotels is investigating a possible payment card breach
- Verizon's Yahoo deal creates tracking powerhouse, privacy groups warn
- GE waves developers onto its huge IoT stage
- Cyberespionage group Patchwork sets its sights on multiple industries
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTSocial Media AssistantQLD
- CCExcel Modelling specialist/consultant.VIC
- FTProject Manager - IT Technology / Site RelocationsNSW
- CCContract Analyst Programmer (Java/J2EE/MyEclise) 160721/AP/vmpAsia
- FTBusiness Intelligence - Policy and Governance ManagerNSW
- CCUX / UI Visual DesignerNSW
- CCSenior Business Analyst with Product Management experienceVIC
- FTAppian DeveloperVIC
- FTMobile DeveloperWA
- FTPortfolio Governance ConsultantNSW
- FTAEM & AEM Forms ConsultantsWA
- CCPre-Sales Consulting Business AnalystVIC
- CCContract Analyst Programmer (Java/SQL) 160721/AP/624Asia
- CCProject Manager - Change/Transformation/Project DeliveryNSW
- FTSoftware Tester | Innovation | Business FacingNSW
- CCDatabase developer/ModellerACT
- FT1st Level IT Support - Microsoft EnvironmentNSW
- FTSenior Manager (Business Data Management)NSW
- FTAgile Coach / Training & Support ManagerNSW
- CCContract Analyst Programmer (JAVA/J2EE/Oracle) 160801/AP/258Asia
- CCSAP FICO Consultant/SAP FICO Stream LeadNSW
- FTNetwork Infrastructure SpecialistSA
- CCContract Analyst Programmer (JAVA/Oracle) 160728/AP/623Asia
- CCEnvironment ManagerVIC
- CCAsp.Net Developer with Angular, SQL,Twitter Bootstrapper, CSSNSW