Article | 7/05/2013 AutoIt scripting increasingly used by malware developersAutoIt, a scripting language for automating Windows interface interactions, is increasingly being used by malware developers thanks to its flexibility...
Article | 18/04/2013 Researchers find malware targeting online stock trading softwareSecurity researchers from Russian cybercrime investigations company Groub-IB have recently identified a new piece of malware designed to steal login c...
Article | 2/04/2013 Researchers find APT malware that monitors mouse clicks to evade detectionResearchers from security vendor FireEye have uncovered a new APT (advanced persistent threat) that uses multiple detection evasion techniques, includ...
Article | 1/04/2013 Ransomware leverages victims' browser histories for increased credibilityThe authors of police-themed ransomware have started using the browsing histories from infected computers in order to make their scams more believable...
Article | 26/03/2013 Most Java-enabled browsers vulnerable to widespread Java exploits, Websense saysMost browser installations use outdated versions of the Java plug-in that are vulnerable to at least one of several exploits currently used in popular...
Article | 22/03/2013 Researchers uncover vSkimmer malware targeting point-of-sale systemsA new piece of custom malware sold on the underground Internet market is being used to siphon payment card data from point-of-sale (POS) systems, acco...
Article | 21/03/2013 Researchers find TeamViewer-based cyberespionage operationSecurity researchers have uncovered yet another ongoing cyberespionage operation targeting political and human rights activists, government agencies, ...
Article | 15/03/2013 Researchers find vulnerability in EA's Origin platformUsers of Origin, the game distribution platform of Electronic Arts (EA), are vulnerable to remote code execution attacks through origin:// URLs, accor...
Article | 15/03/2013 3G and 4G USB modems are a security threat, researcher saysThe vast majority of 3G and 4G USB modems handed out by mobile operators to their customers are manufactured by a handful of companies and run insecur...
Article | 7/03/2013 Kaspersky Internet Security 2013 bug can lead to system freezeKaspersky Lab's Internet Security 2013 product contains a bug that can be exploited remotely, especially on local networks, to completely freeze the O...
Article | 6/03/2013 Following hack, Evernote speeds move to two-factor authenticationEvernote is speeding up its plans to offer two-factor authentication to users following a recent data breach that exposed user names, email addresses ...
Article | 5/03/2013 Cybercriminals using digitally signed Java exploits to trick usersSecurity researchers warn that cybercriminals have started using Java exploits signed with digital certificates to trick users into allowing the malic...
Article | 20/02/2013 Many companies likely affected by compromise of popular iOS developer forumThe administrators of a popular iOS developer Web forum called iPhoneDevSDK confirmed Wednesday that it had been compromised by hackers who used it to...
Article | 17/02/2013 Adobe to release emergency patches for Reader, AcrobatAdobe Systems said it will release patches for two critical vulnerabilities disclosed last week that are actively being used by attackers.
Best Deals on PCWorld
- TabletsView all »
- NotebooksView all »
- Mobile PhonesView all »
- Printers & ScannersView all »
- Networking, Wireless & VoIPView all »
Sign up to PC World Today for the latest news, reviews and galleries from PC World Australia.Sign up now »
- FTR&D EngineerSA
- FTLead Software EngineerSA
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTOS Web Applications DeveloperNSW
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTWeb Analyst - WebTrendsVIC
- FTSenior Python DeveloperNSW
- FTTechnical Consulting ManagerNSW
- FTTest EngineerVIC
- FTTechnical Business AnalystNSW
- FTQuality ManagerSA
- FTFlash / ActionScript Developer - ContractNSW