Malwarebytes said it may take three to four weeks to fix flaws in its consumer product found by Google security researcher Tavis Ormandy.
A banking trojan, known for its small size but powerful capabilities, has expanded the number of financial institutions it can collect data from, according to security vendor Avast.
A type of malware called Reveton, which falsely warns users they've broken the law and demands payment of a fine, has been upgraded with powerful password stealing functions, according to Avast.
It's generally accepted that antivirus programs provide a necessary protection layer, but organizations should audit such products before deploying them on their systems because many of them contain serious vulnerabilities, a researcher warned.
Victims of Simplocker, the first file-encrypting ransomware threat for Android devices, can recover files without paying cybercriminals because the malicious program uses a hardcoded encryption key.
Prague-based antivirus company, Avast, said, on Monday, it took its community forum offline after a data breach, but payment information was not compromised.
Fresh statistics from the maker of a widely used free security product show the extent to which users are encountering file-encrypting malware known as ransomware.
Microsoft has toughened its criteria for classifying programs as adware and gave developers three months to conform with the new principles or risk having their programs blocked by the company's security products.
A new piece of information-stealing malware that appeared earlier this year has been rapidly gaining traction during the past few weeks, with hundreds of infection attempts being detected every day by antivirus vendors.
Although the number of malicious browser extensions has significantly increased in the past year many security products fail to offer adequate protection against them, while others are simply not designed to do so, according to a security researcher.
An analysis of a piece of Android spyware targeting a prominent Tibetan political figure suggests it may have been built to figure out the victim's exact location.
Security researchers warn that cybercriminals have started using Java exploits signed with digital certificates to trick users into allowing the malicious code to run inside browsers.
The website for Reporters Without Borders was booby-trapped to deliver malicious software using the latest Java and Internet Explorer vulnerabilities, security vendor Avast said on Tuesday.
(Writer's Comment: Starting today, Bugs and Fixes will be posted biweekly each month for your convenience. You'll still be able to read the Bugs and Fixes column in the monthly print issue of PCWorld.)
If you haven't bought a new version of your antivirus software in a couple of years, now may be a good time to do so. Malware is evolving faster than ever, and the latest generation of antivirus software is better equipped to handle this rapid pace o...
Most Popular Reviews
- 1 Huawei P9 review: lifting photography to another level... sometimes.
- 2 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 3 D-Link Taipan AC3200 Ultra tri-band modem-router review
- 4 Dell XPS 13 (2016) review: Making the very best Ultrabook
- 5 Microsoft Surface Book review: The verdict on Microsoft's first notebook
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- Should Netflix refund its geoblocked customers for their inconvenience?
- Innovation: Not with a boom but a whisper
- HPE has won US$3 billion in a lawsuit against Oracle
- Tesla's autopilot is being investigated after a fatal crash
- Will NBN be the biggest loser in Saturday’s Federal Election?
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
- CCSecurity Solution ArchitectQLD
- FTTechnical Lead - Tier 1 Customer interfaceACT
- CCTechnologyOne System Administration and DevelopmentACT
- CCSenior Project Coordinator - Large Telco - URGENTNSW
- FTSystems EngineerNSW
- FTSOE Engineer - End User ComputingQLD
- CCContract IT Assistant (IT Security/IT Audit) 160621/ITA/361Asia
- CCField Network Engineer - GSM Networks.VIC
- CCSnr IT Project Manager - Contact CentreVIC
- CCProject Manager | Experimental military technology | NV1ACT
- FTSenior Manager Practice LeadNSW
- FTBusiness AnalystNSW
- CCSoftware Biomedical Solutions ArchitectSA
- CCBusiness Impact AssessmentsVIC
- FTSenior Software Developer (Full Stack)SA
- CCData Warehouse Specialist- Power BI, SSAS DBA, Azure, SQLNSW
- FTMid-Level .NET DeveloperVIC
- FTMobility Developer x 2 - iOS and Android positions available!NSW
- CCIT Helpdesk Support- Remedy ticketing systemNSW
- FTFull-Stack .NET DeveloperVIC
- FT.Net Developer (WebAPI / Entity Framework / SQL Server)NSW
- CCLinux Systems AdministratorQLD
- CCSystems Engineer | Experimental military technology | NV1ACT
- FTIT Project Coordinator- Data Center Infrastructure backgroundNSW
- FTLooking for a PEGA Developer with Baseline ClearanceVIC