Hacking Team, a firm best known for helping governments spy on their citizens, has been hacked. Here's a curated look at the documents, contracts, and code discovered by researchers sorting the data online.
hackers in pictures
From televisions to passenger planes, even the most unassuming device can, if accessed by the wrong people, be turned into something more sinister.
The year's only halfway done, but hackers have already filled enough headlines to last a decade.
From online bank heists to Chinese hackers, 2013 is adding up to be a security mess
CSO contributors Ira Winkler and Araceli Treu Gomes speak with Chris Inglis, former deputy director of the NSA, about his perceptions of Edward Snowden.
Google doubled the bounty it will pay for a successful exploit of its Chromebook laptop to US$100,000, sweetening the pot in hopes of drawing more attention from security researchers.
Hackers based in Iran have been using malware to spy on individuals, including potentially dissidents and activists in the country, according to new research from Symantec.
Thousands of medical devices, including MRI scanners, x-ray machines and drug infusion pumps, are vulnerable to hacking, creating significant health risks for patients, security researchers said this week.
Russian-speaking hackers have breached 97 websites, mostly dating-related, and stolen login credentials, putting hundreds of thousands of users at risk.
Well, that was fast. Do-it-yourself electronics kit maker and hobby retailer Adafruit recently announced that a hacker had won the company's Open Kinect Bounty. Spain-based hacker Hector Martin Cantero, who is known online as "marcan," released a pro...
Technology drives just about everything we do, and not just at our jobs. From banks to hospitals to the systems that keep the juice flowing to our homes, we are almost entirely dependent on tech. More and more of these systems are interconnected, and...
Quick: What's a hacker? A pimply faced teenager in a dark bedroom trying to start World War Three, or a thirty-something professional with mad computer skills?
Whitepapers about hackers
Given the advances attackers have been making, it is very unlikely that organizations will be able to keep motivated and patient adversaries out of their networks. In most cases, the best one can hope for is to detect targeted attacks early and limit the amount of information the attackers can obtain access to. In this whitepaper, we identify the timeline of a typical attack sequence and the tools available for implementing custom defence strategies.
Videos about hackers
Most Popular Reviews
- 1 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 2 D-Link Taipan AC3200 Ultra tri-band modem-router review
- 3 Dell XPS 13 (2016) review: Making the very best Ultrabook
- 4 Microsoft Surface Book review: The verdict on Microsoft's first notebook
- 5 Telstra Wi-Fi 4GX Advanced III review: Testing the world's first 600Mbps wireless hotspot
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- Intel is said to mull selling its security business
- Huawei P9 review: lifting photography to another level... sometimes.
- If Tim Burton made a robot, this would be it
- Here's how NASCAR is digitizing race day
- Should Microsoft release a successor to Surface 3?
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTJava DeveloperAsia
- CCContract Analyst Programmer (JAVA/SQL) 160617/AP/623Asia
- CCMulesoft Integration DeveloperWA
- FTManager of Infrastructure ServicesVIC
- CCData ArchitectSA
- FTAppian Developer/ArchitectVIC
- CCContract Analyst Programmer (JAVA/SQL) 160629/AP/793Asia
- CCProject Master SchedulerVIC
- FTEnterprise Technology Platform ManagerVIC
- CCContract Junior Programmer (HTML/JAVA/MySQL) 160613/JP/921Asia
- CCContract IT Assistant (IT Security/IT Audit) 160621/ITA/361Asia
- CCSAP BASIS ConsultantVIC
- CCIT Finance Systems Process AnalystNSW
- FTTechnical Lead - Tier 1 Customer interfaceACT
- CCProject ManagerNSW
- CCProduct Solution DesignerVIC
- FTSystems Analyst - ERPNSW
- CCContract Analyst Programmer (J2EE/JAVA/SQL) 160621/AP/082Asia
- FTTechnical Support - ImplementationsVIC
- CCInside Sales Specialist / Customer Service - TelecommunicationsNSW
- CCSystems Trainer - Networking/ RadioVIC
- CCApplication Support Analyst and Database AdministratorVIC
- CCIT Assistant (Office Automation/Windows) 160615/ITA/922Asia
- FTSolution Architect - Data/ InformationVIC
- CCIT Desktop Support- Travelling in NSW requiredNSW