he January 2015 edition of Microsoft Patch Tuesday might be more notable for what the monthly release of security bulletins does not contain -- there are no fixes for the Microsoft Explorer browser this month.
Several photo, video and other media editing programs from software maker Corel contain DLL hijacking vulnerabilities that could allow attackers to execute malicious code on users' computers.
Google released details of a second unpatched privilege escalation flaw in Windows 8.1 in less than a month, drawing criticism from Microsoft.
Server administrators are advised to upgrade OpenSSL again to fix eight new vulnerabilities, two of which can lead to denial-of-service (DoS) attacks.
A vulnerability in Asuswrt, the firmware running on many wireless router models from Asustek Computer, allows attackers to completely compromise the affected devices. Malicious hackers, however, need to launch their attacks from within the local netw...
CryptoWall, one of a family of malware programs that encrypts files and demands a ransom from victims, has undergone a revamp that is frustrating security researchers.
Apple has fixed an issue that could have allowed attackers to launch brute-force attacks against iCloud users in order to guess their passwords.
Three vendors have released fixes for vulnerabilities found in the critical firmware used during a computer's startup, according to an advisory from the U.S. Computer Emergency Readiness Team.
A Google researcher has disclosed an unpatched vulnerability in Windows 8.1 after Microsoft didn't fix the problem within a 90-day window Google gave its competitor.
In today's world of agile software development and fast release cycles, developers increasingly rely on third-party libraries and components to get the job done. Since many of those libraries come from long-running, open-source projects, developers o...
Three out of three? That could be the score for the U.S. National Security Agency's cryptographic "most wanted" list of 2012.
Attackers can infect MacBook computers with highly persistent boot rootkits by connecting malicious devices to them over the Thunderbolt interface.
An open-source component used to display PDF files on WikiLeaks.org and other websites contains vulnerabilities that could be exploited to launch cross-site scripting (XSS) and content spoofing attacks against visitors.
Remote code execution vulnerabilities in the standard implementation of the network time protocol (NTP) can be exploited by attackers to compromise servers, embedded devices and even critical infrastructure systems that run UNIX-like operating system...
A critical vulnerability in client software used to interact with Git, a distributed revision control system for managing source code repositories, allows attackers to execute rogue commands on computers used by developers.
Lexar® JumpDrive® S57 USB 3.0 flash drive
Microsoft L5V-00027 Sculpt Ergonomic Keyboard Desktop
Everki ContemPRO Roll Top Laptop Backpack
Epson EcoTank Expression ET-2500
Samsung portable 1TB T3 drive
UE Boom 2 Bluetooth speaker
Smart LED Bulb LB130
Linksys AC5400 MU-MIMO Gigabit router
Epson WorkForce ET-4550
Epson WorkForce DS-360W
3SIXT Ultra HD Sports Action Camera
Logitech G403 Prodigy mouse
Acer Swift 7
Belkin MIXIT Metallic Lightning to USB Cable
Lexar® Portable SSD
Google Daydream VR headset
Huawei Mate 9
Lexar® JumpDrive® S45 USB 3.0 flash drive
Lexar® Professional 1800x microSDHC™/microSDXC™ UHS-II cards
HD Pan/Tilt Wi-Fi Camera with Night Vision NC450
Dell XPS 13 laptop
Blade 28 backpack by Arc’teryx
HP Pavilion x360 13”
Garmin Fenix Chronos smartwatch
Audio-Technica ATH-ANC70 Noise Cancelling Headphones
Dell Inspiron 5000 series 2-in-1
Surface Pro 4
Lexar® JumpDrive® C20c USB Type-C flash drive
Most Popular Reviews
- 1 Oppo R9s Plus phone: Full, in-depth review
- 2 Samsung 2017 QLED Q7 TV: Full, in-depth review
- 3 HTC U Ultra phone full, in-depth review
- 4 Gigabyte Aorus GA-AX370-Gaming 5 AMD Ryzen AM4 motherboard review
- 5 Venom Blackbook Zero 14 laptop review
Join the PC World newsletter!
Latest News Articles
- Inkle's space archaeologist adventure won't tell you if your lost language translations are wrong
- Dell's 28-inch 4K monitor is just $300 right now
- Apple: Macs and iPhones are safe from newly revealed CIA exploits
- Microsoft delays tools for third-party Cortana integrations
- Google Play faces cat and mouse game with sneaky Android malware
PCW Evaluation Team
A smarter way to print for busy small business owners, combining speedy printing with scanning and copying, making it easier to produce high quality documents and images at a touch of a button.
I've had a multifunction printer in the office going on 10 years now. It was a neat bit of kit back in the day -- print, copy, scan, fax -- when printing over WiFi felt a bit like magic. It’s seen better days though and an upgrade’s well overdue. This HP OfficeJet Pro 8730 looks like it ticks all the same boxes: print, copy, scan, and fax. (Really? Does anyone fax anything any more? I guess it's good to know the facility’s there, just in case.) Printing over WiFi is more-or- less standard these days.
As a freelance writer who is always on the go, I like my technology to be both efficient and effective so I can do my job well. The HP OfficeJet Pro 8730 Inkjet Printer ticks all the boxes in terms of form factor, performance and user interface.
I’d happily recommend this touchscreen laptop and Windows 10 as a great way to get serious work done at a desk or on the road.
Ultimately, I think the Windows 10 environment is excellent for me as it caters for so many different uses. The inclusion of the Xbox app is also great for when you need some downtime too!
For me, the Xbox Play Anywhere is a great new feature as it allows you to play your current Xbox games with higher resolutions and better graphics without forking out extra cash for another copy. Although available titles are still scarce, but I’m sure it will grow in time.
- And the 2017 winner of the Formula 1 Best Pit Lane Boom Gantry is...
- Behind the scenes with Team Walkinshaw at V8 Supercars Melbourne 2017
- First look at the Formula 1 2017 pit lane in Melbourne, Australia
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- FTSocial Media ExecutiveNSW
- FTInfrastructure ArchitectNSW
- CCTest Manager OfficeACT
- CCTechnical Business Analyst - Infrastructure - VirtualizationNSW
- CCVirtualisation Engineer - IP NetworksVIC
- FTEnterprise Solution ArchitectNSW
- FTTest SpecialistSA
- FTAEM Architect - Blue Chip companyNSW
- CCOrganisational Change Analyst - Banking/Financial ServicesNSW
- FTICT Business Development Manager - Technical Products/SolutionsQLD
- FTNodeJS DeveloperNSW
- CCUnix/Linux Systems AdministratorNSW
- FTDatabase Modelling SpecialistQLD
- CCSenior Teradata Developer/Analyst Programmer - Financial - Contract - ParramattaNSW
- FTICT Project ManagerNSW
- CCSolution ArchitectNSW
- FTSolution Architect l MS Exchange, O365NSW
- TPSolution Architect - Transport DomainVIC
- FTJunior-Mid Level Implementation CoordinatorQLD
- FTSenior C# Analyst Programmer, Product & MarketsNSW
- CC.Net Developer - SilverlightVIC
- FTICT Project ManagerNSW
- FTSales Operations ManagerNSW
- FTResponsive Design Developer, Frontend, PHP, WordpressNSW
- CCProcess Assurance LeadNSW