Hackers will put Internet-connected embedded devices to the test at the DefCon 23 security conference in August. Judging by the results of previous Internet-of-Things security reviews, prepare for flaws galore.
Cybercriminals are increasingly copying cyberespionage groups in using targeted attacks against their victims instead of large-scale, indiscriminate infection campaigns.
TheCartPress, an e-commerce plug-in used on thousands of WordPress-based websites, has several high-risk vulnerabilities.
The software that controls wireless networking chipsets made by Realtek Semiconductor contains a critical vulnerability that could allow attackers to compromise home routers.
The group of attackers behind cyberintrusions at the White House and the Department of State last year used malware that bears strong similarities to cyberespionage tools suspected to be of Russian origin.
Ambiguous WordPress documentation led many plug-in and theme developers to make an error that exposed websites to cross-site scripting (XSS) attacks.
Even though its activities were exposed last year, a cyberespionage group dubbed Pawn Storm has ramped up its efforts over the past few months, targeting NATO members and potentially the White House.
IBM has joined an increasing number of vendors who are pushing for real-time cybersecurity information sharing among private and public organizations, researchers and other network defenders.
Point-of-Sale (PoS) terminals have become an attractive target for hackers over the past year, reflected in the increasing number of RAM-scraping programs that steal payment card information from the memory of such systems.
Web application attacks, point-of-sale intrusions, cyberespionage and crimeware were the leading causes of confirmed data breaches last year.
French-language TV network TV5Monde was hit by a crippling cyberattack Wednesday that disrupted broadcasting across its channels and also involved the hijacking of its website and social media accounts.
A vulnerability in the popular WP Super Cache plug-in for WordPress could allow attackers to inject malicious scripts into websites. The scripts, when loaded by administrators, could trigger unauthorized actions.
In the latest blow to Internet of Things (IoT) security, an analysis of smart home devices has found flaws that could give attackers access to sensitive data or allow them to control door locks and sensors.
A new open-source tool can periodically scan an area for rogue Wi-Fi access points and can alert network administrators if any are found.
For the past two years, a cyberespionage group that likely operates from Lebanon has hacked into hundreds of defense contractors, telecommunications operators, media groups and educational organizations from at least 10 countries.
Samsung portable 1TB T3 drive
UE Boom 2 Bluetooth speaker
Epson EcoTank Expression ET-2500
Smart LED Bulb LB130
Epson WorkForce ET-4550
Microsoft L5V-00027 Sculpt Ergonomic Keyboard Desktop
Lexar® JumpDrive® S57 USB 3.0 flash drive
Everki ContemPRO Roll Top Laptop Backpack
Linksys AC5400 MU-MIMO Gigabit router
3SIXT Ultra HD Sports Action Camera
Lexar® Portable SSD
Huawei Mate 9
Acer Swift 7
Epson WorkForce DS-360W
Google Daydream VR headset
Lexar® JumpDrive® S45 USB 3.0 flash drive
Logitech G403 Prodigy mouse
Belkin MIXIT Metallic Lightning to USB Cable
HP Pavilion x360 13”
Garmin Fenix Chronos smartwatch
Audio-Technica ATH-ANC70 Noise Cancelling Headphones
Blade 28 backpack by Arc’teryx
Surface Pro 4
Lexar® Professional 1800x microSDHC™/microSDXC™ UHS-II cards
Dell Inspiron 5000 series 2-in-1
HD Pan/Tilt Wi-Fi Camera with Night Vision NC450
Dell XPS 13 laptop
Lexar® JumpDrive® C20c USB Type-C flash drive
Most Popular Reviews
- 1 Oppo R9s Plus phone: Full, in-depth review
- 2 Samsung 2017 QLED Q7 TV: Full, in-depth review
- 3 HTC U Ultra phone full, in-depth review
- 4 Gigabyte Aorus GA-AX370-Gaming 5 AMD Ryzen AM4 motherboard review
- 5 Venom Blackbook Zero 14 laptop review
Join the PC World newsletter!
Latest News Articles
- Leaked iCloud credentials obtained from third parties, Apple says
- Elgato's Stream Deck is a programmable LCD control center that makes game streaming easy
- Google's Android Things OS won't work on new Raspberry Pi board
- Wikileaks documents show CIA's Mac and iPhone compromises
- Senate votes to kill FCC's broadband privacy rules
PCW Evaluation Team
A smarter way to print for busy small business owners, combining speedy printing with scanning and copying, making it easier to produce high quality documents and images at a touch of a button.
I've had a multifunction printer in the office going on 10 years now. It was a neat bit of kit back in the day -- print, copy, scan, fax -- when printing over WiFi felt a bit like magic. It’s seen better days though and an upgrade’s well overdue. This HP OfficeJet Pro 8730 looks like it ticks all the same boxes: print, copy, scan, and fax. (Really? Does anyone fax anything any more? I guess it's good to know the facility’s there, just in case.) Printing over WiFi is more-or- less standard these days.
As a freelance writer who is always on the go, I like my technology to be both efficient and effective so I can do my job well. The HP OfficeJet Pro 8730 Inkjet Printer ticks all the boxes in terms of form factor, performance and user interface.
I’d happily recommend this touchscreen laptop and Windows 10 as a great way to get serious work done at a desk or on the road.
Ultimately, I think the Windows 10 environment is excellent for me as it caters for so many different uses. The inclusion of the Xbox app is also great for when you need some downtime too!
For me, the Xbox Play Anywhere is a great new feature as it allows you to play your current Xbox games with higher resolutions and better graphics without forking out extra cash for another copy. Although available titles are still scarce, but I’m sure it will grow in time.
- First look at the Formula 1 2017 pit lane in Melbourne, Australia
- LG 2017 OLED and Super LED UHD 4K TVs: Hands-on review
- Oppo R9s Plus phone: Full, in-depth review
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- FTSocial Media ExecutiveNSW
- CCChange ManagerNSW
- FTNV1 Cleared Software Engineer (Mid level) - Defence Projects - North Ryde areaNSW
- FTSenior Software Engineer x 2 - Adelaide Based (PV, NV2 or NV1 required)WA
- TPPerformance Test Analyst - Perth BasedQLD
- CCSenior Business Analyst - Forecasting SASNSW
- FTChief Architect - Principal ArchitectVIC
- FTSolution Architect l MS Exchange, O365NSW
- FTSenior Microsoft EngineerVIC
- CCFrom Security Operations to Technical Business Analyst, make the move now!NSW
- FTSenior Software Engineer x 2 - Positive Vetting, NV2 or NV1 required!!!!SA
- CCInfrastructure Project ManagerNSW
- CCSenior Network Designer - CiscoVIC
- FTRACF Mainframe Security Analysts / Engineers - Multiple Roles - SydneyNSW
- CCInside Sales ConsultantNSW
- CCRisk Specialist - TelcoVIC
- FTIt Security and process analystNSW
- CCProcess Improvement Specialist - TelcoVIC
- FTDatabase DeveloperVIC
- CCSenior ABAP DeveloperQLD
- TPBusiness Project Manager - DigitalNSW
- CCSolution ArchitectNSW
- CCSolution ManagerSA
- FTProduct Manager / Business Analyst Clinical Solutions (Lorenzo)QLD
- CCDevOps/Senior Sys Admin - eCommerce - Contract - Sydney Northern BeachesNSW