Article | 11/04/2013 Bitcoin volatility caused by surge in demand, slow softwareBitcoin's roller-coaster price swings on Wednesday were caused by an influx of new buyers and software that couldn't keep up, according to the largest...
Article | 10/04/2013 Hackers turn a Canon EOS camera into a remote surveillance toolThe high-end Canon EOS-1D X camera can be hacked for use as a remote surveillance tool, with images remotely downloaded, erased and uploaded, a resear...
Article | 10/04/2013 Ubisoft takes download service offline after breachUbisoft Entertainment said Wednesday it took its Uplay download service offline until it fixes an issue that reportedly allowed hackers to download ga...
Article | 9/04/2013 Microsoft's April Patch Tuesday brings no Pwn2Own fixSystem administrators and IT security pros can take bit of a breather: Microsoft has issued a comparatively light set of patches for this edition of i...
Article | 5/04/2013 PostgreSQL releases updates to address high-risk vulnerability, other issuesThe PostgreSQL developers released updates for all major branches of the popular open-source database system on Thursday in order to address several v...
Article | 4/04/2013 Sophos fixes vulnerabilities in its Web security applianceSecurity vendor Sophos has released an update for the software used on its Web gateway security appliance in order to address three serious vulnerabil...
Article | 4/04/2013 Bitcoin storage service, Instawallet, suffers database attackAn online bitcoin storage service, Instawallet, said Wednesday it is accepting claims for stolen bitcoins after the company's database was fraudulentl...
Article | 29/03/2013 Critical denial-of-service flaw in BIND software puts DNS servers at riskA flaw in the widely used BIND DNS (Domain Name System) software can be exploited by remote attackers to crash DNS servers and affect the operation of...
Article | 26/03/2013 Most Java-enabled browsers vulnerable to widespread Java exploits, Websense saysMost browser installations use outdated versions of the Java plug-in that are vulnerable to at least one of several exploits currently used in popular...
Article | 22/03/2013 Temporary fixes released for Samsung Android lock-screen glitchTwo security vendors have released temporary fixes for a flaw in some Samsung Android phones that could allow an attacker to bypass a locked screen.
Article | 15/03/2013 Researchers find vulnerability in EA's Origin platformUsers of Origin, the game distribution platform of Electronic Arts (EA), are vulnerable to remote code execution attacks through origin:// URLs, accor...
Article | 15/03/2013 Hackers can cause traffic jams by manipulating real-time traffic data, researcher saysHackers can influence real-time traffic-flow-analysis systems to make people drive into traffic jams or to keep roads clear in areas where a lot of pe...
Article | 15/03/2013 Security appliances are riddled with serious vulnerabilities, researcher saysThe majority of email and Web gateways, firewalls, remote access servers, UTM (united threat management) systems and other security appliances have se...
Article | 14/03/2013 US NIST's vulnerability database hackedA U.S. government computer vulnerability database and several other websites at the National Institute of Standards and Technology have been down for ...
Best Deals on PCWorld
- Mobile PhonesView all »
- NotebooksView all »
- TabletsView all »
- Printers & ScannersView all »
- Networking, Wireless & VoIPView all »
Sign up to PC World Today for the latest news, reviews and galleries from PC World Australia.Sign up now »
- FTR&D EngineerSA
- FTTechnical Business AnalystNSW
- FTSenior Python DeveloperNSW
- FTFlash / ActionScript Developer - ContractNSW
- FTTest EngineerVIC
- FTOS Web Applications DeveloperNSW
- FTWeb Analyst - WebTrendsVIC
- FTLead Software EngineerSA
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTQuality ManagerSA
- FT.NET - Sitecore Developer - Melbourne - PermNSW