Antivirus vendor Avast Software has agreed to buy rival AVG Technologies for US$1.3 billion in cash.
Malwarebytes said it may take three to four weeks to fix flaws in its consumer product found by Google security researcher Tavis Ormandy.
A banking trojan, known for its small size but powerful capabilities, has expanded the number of financial institutions it can collect data from, according to security vendor Avast.
A type of malware called Reveton, which falsely warns users they've broken the law and demands payment of a fine, has been upgraded with powerful password stealing functions, according to Avast.
It's generally accepted that antivirus programs provide a necessary protection layer, but organizations should audit such products before deploying them on their systems because many of them contain serious vulnerabilities, a researcher warned.
Victims of Simplocker, the first file-encrypting ransomware threat for Android devices, can recover files without paying cybercriminals because the malicious program uses a hardcoded encryption key.
Prague-based antivirus company, Avast, said, on Monday, it took its community forum offline after a data breach, but payment information was not compromised.
Fresh statistics from the maker of a widely used free security product show the extent to which users are encountering file-encrypting malware known as ransomware.
Microsoft has toughened its criteria for classifying programs as adware and gave developers three months to conform with the new principles or risk having their programs blocked by the company's security products.
A new piece of information-stealing malware that appeared earlier this year has been rapidly gaining traction during the past few weeks, with hundreds of infection attempts being detected every day by antivirus vendors.
Although the number of malicious browser extensions has significantly increased in the past year many security products fail to offer adequate protection against them, while others are simply not designed to do so, according to a security researcher.
An analysis of a piece of Android spyware targeting a prominent Tibetan political figure suggests it may have been built to figure out the victim's exact location.
Security researchers warn that cybercriminals have started using Java exploits signed with digital certificates to trick users into allowing the malicious code to run inside browsers.
The website for Reporters Without Borders was booby-trapped to deliver malicious software using the latest Java and Internet Explorer vulnerabilities, security vendor Avast said on Tuesday.
(Writer's Comment: Starting today, Bugs and Fixes will be posted biweekly each month for your convenience. You'll still be able to read the Bugs and Fixes column in the monthly print issue of PCWorld.)
Gadgets & Things
Most Popular Reviews
- 1 Finally! LG OLED TV 2016 range review
- 2 Google Daydream View VR full, in-depth review
- 3 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
- 4 Apple iPhone 7 Plus review: including Portrait Mode
- 5 MSI GS70 laptop review
Join the PC World newsletter!
Latest News Articles
- Intel, Microsoft going long distance with Cortana on Windows 10 PCs
- Obama orders review of election hacks as Trump doubts Russia's role
- Ransomware attacks against businesses increased threefold in 2016
- Attackers use hacked home routers to hit Russia's 5 largest banks
- US mulls rules for airlines that plan in-flight Wi-Fi voice calls
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
- The top 10 best and worst tech gadgets and products of 2016
- TV of the year award 2016
- Best phone of the year 2016
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- TPProcess Business AnalystVIC
- CCConsumer Social Specialist / Campaign Manager (Digital)VIC
- CCElectronic Medications Management Solution ArchitectQLD
- FTChief Security Officer l CISSP l ISO27001NSW
- FTChief Security Officer l CISSP l ISO27001VIC
- FTEnterprise ArchitectACT
- TPSenior Network Engineer (Newcastle Based)NSW
- CCUI DesignerNSW
- CCSenior Project Coordinator - Banking/Financial ServicesNSW
- PTProject ManagersACT
- FTChief Security Officer l CISSP l ISO27001NSW
- CCSecurity SpecialistVIC
- CCBI/DW Lead DeveloperVIC
- CCLotus Notes DeveloperNSW
- FTSenior Java DeveloperNSW
- CCPerformance Test AnalystQLD
- FTProduct Designer - UIVIC
- CCSEM / PPC / Paid Search Specialist - 6 Month Contract RoleNSW
- CCSenior Integration DeveloperNSW
- FTDesktop Support Team LeaderVIC
- FTDatabase Administration Team LeaderQLD
- TPService Desk Analyst - Out of hoursSA
- FTWinforms Developer - European Integration ProgramVIC
- CCIteration Manager - DigitalNSW
- FTDevelopment Manager / Engineering Manager - Canberra RoleACT