Article | 17/12/2010 More censorship, data breaches and devices: Security predictions for 2011This past year has been a doozy in the security world.
Article | 15/12/2010 Gawker hack exposes ridiculous password habitsWhew! Is it just me, or is it getting tough to keep track of all the info spilled via this week's massive Gawker hack?
Article | 14/12/2010 McDonald's customer data compromised through contractorMcDonald's is warning customers to be on guard against identity theft, phishing attacks, or other scams thanks to a data breach. What makes the data c...
Article | 11/12/2010 Fearing more Wikileaks, military bans DVDs, thumb drivesRemovable media such as CDs, DVDs and USB drives are no longer allowed on classified military computers.
Article | 8/12/2010 WikiLeaks: Don't shoot the messengerWith all of the hype and furor over WikiLeaks exposing sensitive government documents, it is easy to jump to the conclusion that WikiLeaks is bad, and...
Article | 8/12/2010 Operation payback: WikiLeaks avenged by hacktivistsWikiLeaks has been experiencing some issues lately ranging from having its Web hosting services shutdown to having its accounts frozen and the flow of...
Article | 3/12/2010 Prevent your data from becoming the next WikiLeaks headlineWikiLeaks is making as many waves as it is headlines these days -- challenging the balance between the right to free speech and the need to defend nat...
Article | 30/11/2010 Trend Micro purchase boosts data protectionTrend Micro announced that it has signed a definitive agreement to acquire Mobile Armor -- a company that specializes in endpoint data protection. The...
Article | 24/11/2010 Google takes Office to the Cloud, security issues remainGoogle has begun testing an intriguing plugin for Microsoft Office. Google Cloud Connect is a devastatingly simple concept: rather than save your file...
Article | 18/11/2010 McAfee reports malware at all-time highMcAfee today revealed its McAfee Threat Report for the third quarter of 2010. Information like that provided by McAfee in these quarterly reports is v...
Article | 18/11/2010 Admin passwords are the achilles heel of securityPasswords are the predominant means of securing sensitive data, and that is why there are established best practices defining password policies. Sadly...
Article | 10/11/2010 Cisco SA 520 firewall disappointsThere are two ways to look at the Cisco SA 520 network security appliance. On one hand, it offers a solid array of features: 65Mbps IPSec VPN throughp...
Article | 3/11/2010 Google pays cash to hackers for Web app security flawsWanted by Google: Bounty-hunting hackers who can find security vulnerabilities in popular Web apps.
Article | 27/10/2010 How to protect against Firesheep attacksSecurity experts today suggested ways Firefox users can protect themselves against Firesheep, the new browser add-on that lets amateurs hijack users' ...
Best Deals on PCWorld
- TabletsView all »
- NotebooksView all »
- Mobile PhonesView all »
- Printers & ScannersView all »
- Networking, Wireless & VoIPView all »
Sign up to PC World Today for the latest news, reviews and galleries from PC World Australia.Sign up now »
- FTLead Software EngineerSA
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTFlash / ActionScript Developer - ContractNSW
- FTSenior Python DeveloperNSW
- FTWeb Analyst - WebTrendsVIC
- FTQuality ManagerSA
- FTTest EngineerVIC
- FTTechnical Consulting ManagerNSW
- FTR&D EngineerSA
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTTechnical Business AnalystNSW
- FTOS Web Applications DeveloperNSW