The U.S. Department of Justice wants new authority to hack and search remote computers during investigations, saying the new rules are needed because of complex criminal schemes sometimes using millions of machines spread across the country.
The sole target detected by Symantec of attacks using a recent Internet Explorer vulnerability was the website of the Japan Basketball Association, whose chairman is a high-ranking Japanese government official.
Target is upgrading the security of its store-branded payment cards and making other network improvements as it seeks to restore confidence after one of the largest-ever data breaches last year.
Adobe Systems released emergency security updates for Flash Player in order to fix a vulnerability that has been exploited in attacks against users since earlier this month.
A cybercriminal operation that combines phone-based social engineering attacks with spear phishing and malware to steal money from organizations has resurfaced this year, finding victims in French-speaking countries in particular.
The security researcher who identified an admin backdoor in a range of routers last year has found that Netgear's patches don't adequately address the security issue.
Web application attacks, cyber-espionage and point-of-sale intrusions were among the top IT security threats in 2013, according to Verizon's latest annual report on data breach investigations.
Security researchers have found that many satellite communication systems have vulnerabilities and design flaws that can let remote attackers intercept, manipulate, block and in some cases take full control of critical communications.
About 2.6 million payment cards at Michaels Stores and another 400,000 at subsidiary Aaron Brothers may have been affected in a card skimming attack that compromised its point-of-sale systems, the retailer said Thursday.
Website operators should assess their whole Web infrastructure when patching the critical Heartbleed flaw in OpenSSL, otherwise they risk leaving important components open to remote attacks, despite fixing the problem on their publicly facing servers...
Home routers and other consumer embedded devices are plagued by basic vulnerabilities and can't be easily secured by non-technical users, which means they'll likely continue to be targeted in what has already become an increasing trend of mass attack...
Security researchers released technical details and proof-of-concept code for 30 security issues affecting Oracle's Java Cloud Service, some of which could allow attackers to compromise business-critical Java applications deployed on it.
The latest firmware in some Philips smart TV models opens an insecure Miracast wireless network, allowing potential attackers located in the signal range to control the TV remotely and perform unauthorized actions.
On Sunday morning, Nate Daiger, one of the owners of a small Los Angeles-based hosting company Chunk Host, received an odd email on his phone.
Security vendor Trustwave was accused in a class-action suit of failing to detect the attack that led to Target's data breach, one of the largest on record.
Samsung portable 1TB T3 drive
Smart LED Bulb LB130
Lexar® JumpDrive® S57 USB 3.0 flash drive
Microsoft L5V-00027 Sculpt Ergonomic Keyboard Desktop
Epson EcoTank Expression ET-2500
UE Boom 2 Bluetooth speaker
Everki ContemPRO Roll Top Laptop Backpack
Epson WorkForce ET-4550
Linksys AC5400 MU-MIMO Gigabit router
3SIXT Ultra HD Sports Action Camera
Belkin MIXIT Metallic Lightning to USB Cable
Lexar® JumpDrive® S45 USB 3.0 flash drive
Acer Swift 7
Logitech G403 Prodigy mouse
Epson WorkForce DS-360W
Lexar® Portable SSD
Google Daydream VR headset
Huawei Mate 9
Dell Inspiron 5000 series 2-in-1
Audio-Technica ATH-ANC70 Noise Cancelling Headphones
Garmin Fenix Chronos smartwatch
Dell XPS 13 laptop
Lexar® JumpDrive® C20c USB Type-C flash drive
Surface Pro 4
Blade 28 backpack by Arc’teryx
Lexar® Professional 1800x microSDHC™/microSDXC™ UHS-II cards
HD Pan/Tilt Wi-Fi Camera with Night Vision NC450
HP Pavilion x360 13”
Most Popular Reviews
- 1 Huawei Mate 9 full in-depth smartphone review
- 2 ZTE Axon 7 review: Is ZTE dumping old stock on Australia?
- 3 Oppo R9s smartphone full review
- 4 Huawei Nova Plus smartphone review
- 5 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
Join the PC World newsletter!
Latest News Articles
- SHA-1 collision can break SVN code repositories
- Google is giving away a Chromecast with the Google Home
- SK Telecom pushes for interoperable quantum crypto systems
- Facebook's Telecom Infra Project is a year old
- Cog Systems offers more secure version of HTC A9 smartphone
PCW Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
- How to quit Pokemon Go (or to start enjoying it again)
- Huawei Mate 9 full in-depth smartphone review
- Time to ditch Foxtel and the iQ3: How to replace Foxtel packages with cheaper alternatives
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- TPProject CoordinatorNSW
- TPBusiness AnalystACT
- FTMid Level PHP DeveloperNSW
- TPProject Support OfficerQLD
- TPSenior Service Desk AnalystNSW
- FTInfrastructure Business AnalystNSW
- CCUnix AdministratorNSW
- CCTechnical Consultant - ITSM/HP Service ManagerVIC
- CCDevops Consultant - 12 month contractVIC
- CCServiceNOW DeveloperNSW
- TPIT Project CoordinatorVIC
- TPe-Learning Developer (Captivate 8)VIC
- TPGIS Developer - 6 month ContractQLD
- TPiOS Developer (Mobile)NSW
- CCSenior Technical SpecialistNSW
- CCSenior System AdministratorVIC
- FTDeveloper/ ProgrammerSA
- FTSenior Business AnalystNSW
- TPOrganisational Change Manager - ICT Services TransformationQLD
- FTSolution Architect l MS Exchange, O365NSW
- CCFinance Analyst/ Project SpecialistVIC
- CCMDM Consultant/DesignerVIC
- TPCrystal Reports DeveloperSA
- TPAgile Project Manager. Sharepoint / PeoplesoftNSW
- FTSupport Analyst / Production Support - InformaticaNSW