Over the last few days, a large number of British Airways customers have found that reward points they accumulated for flights, called Avios, have disappeared from their accounts. Others have been locked out of their accounts completely.
Some Internet gateway devices commonly used by hotels and conference centers can easily be compromised by hackers, allowing them to launch a variety of attacks against guests accessing the Wi-Fi networks.
Attackers could have remotely installed malware on systems running a flawed Dell support tool used to detect customers' products.
You don't need to be the NSA to tap calls on Cisco's SPA 300 and 500 IP phones: An authentication flaw allows potential attackers to do that by default.
It came as a shock to just about no one in the cybersecurity industry that China has a cyberware unit, which was acknowledged by the government there this week.
More than 700,000 ADSL routers provided to customers by ISPs around the world contain serious flaws that allow remote hackers to take control of them.
As many as 11 million customers may have been affected by a data breach at U.S. health insurance provider Premera Blue Cross, in the second large attack against the health care industry disclosed in the last two months.
A collection of computer Trojans that have been used since 2009 to steal data from government agencies, military contractors, media organizations and other companies is tied to cyberespionage malware possibly created by French intelligence agencies.
British law enforcement agencies arrested a 23-year-old man suspected of being involved in a hacking attack last year against a satellite communications system operated by the U.S. Department of Defense.
Adobe Systems launched a new program that encourages security researchers to find and report vulnerabilities in the company's websites and other online services.
Lenovo's website appeared to have been hacked on Wednesday, possibly in retaliation for a piece of adware it installed on PCs that was found to have opened up a security hole.
Security researchers are urging users to install new Samba security updates in order to address a critical vulnerability that allows attackers to execute arbitrary code with root privileges.
Attackers who penetrate company networks often pose as legitimate users for long periods of time, causing lengthy delays before victims figure out they've been hacked.
U.S. and U.K. intelligence agencies have reportedly hacked into the computer network of giant SIM card maker Gemalto and taken smartphone encryption keys potentially used by customers of hundreds of mobile phone carriers worldwide.
A cyberespionage group with a toolset similar to ones used by U.S. intelligence agencies has infiltrated key institutions in countries including Iran and Russia.
Epson WorkForce ET-4550
Linksys AC5400 MU-MIMO Gigabit router
Lexar® JumpDrive® S57 USB 3.0 flash drive
Smart LED Bulb LB130
Everki ContemPRO Roll Top Laptop Backpack
Samsung portable 1TB T3 drive
Microsoft L5V-00027 Sculpt Ergonomic Keyboard Desktop
UE Boom 2 Bluetooth speaker
Epson EcoTank Expression ET-2500
Huawei Mate 9
Epson WorkForce DS-360W
Acer Swift 7
Lexar® JumpDrive® S45 USB 3.0 flash drive
Google Daydream VR headset
3SIXT Ultra HD Sports Action Camera
Lexar® Portable SSD
Belkin MIXIT Metallic Lightning to USB Cable
Logitech G403 Prodigy mouse
Lexar® JumpDrive® C20c USB Type-C flash drive
Dell XPS 13 laptop
HP Pavilion x360 13”
HD Pan/Tilt Wi-Fi Camera with Night Vision NC450
Blade 28 backpack by Arc’teryx
Surface Pro 4
Lexar® Professional 1800x microSDHC™/microSDXC™ UHS-II cards
Audio-Technica ATH-ANC70 Noise Cancelling Headphones
Garmin Fenix Chronos smartwatch
Dell Inspiron 5000 series 2-in-1
Most Popular Reviews
- 1 Huawei Mate 9 full in-depth smartphone review
- 2 ZTE Axon 7 review: Is ZTE dumping old stock on Australia?
- 3 Oppo R9s smartphone full review
- 4 Huawei Nova Plus smartphone review
- 5 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
Join the PC World newsletter!
Latest News Articles
- This tiny chip could revolutionize smartphone and IOT security
- Torment: Tides of Numenera review: The Planescape successor you've been waiting for
- DJI's rugged Matrice 200 series drones go where no drone has gone before
- Alibaba calls for tougher Chinese laws against counterfeiters
- Kogan curved 4K UHD 55-inch LED LCD TV review
PCW Evaluation Team
- How to quit Pokemon Go (or to start enjoying it again)
- Huawei Mate 9 full in-depth smartphone review
- Time to ditch Foxtel and the iQ3: How to replace Foxtel packages with cheaper alternatives
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- CCIT Procurement OfficerNSW
- TPDeployment Specialist (DevOps)QLD
- CCLevel 1/2 SAP Support AnalystACT
- FTMid Level PHP DeveloperNSW
- TPProject Manager to manage two concurrent ProjectsQLD
- FTLevel 3 EngineerNSW
- CCNetwork Engineer (cisco)NSW
- CCFront End DeveloperNSW
- TPDigital Project ManagerVIC
- FTPrincipal Architect - Infrastructure | Major BankVIC
- FTTelecommunications Services Manager - Voice/Data/UCQLD
- CCSAP Billing & Invoicing ConsultantNSW
- FTTechnical Team Leader | ArchitectQLD
- TPJava DeveloperVIC
- CCSystem EngineerSA
- CCSAP ISU Device Management ConsultantNSW
- CCNetwork Specialist - IPAM TelcoVIC
- TPDigital Strategist - Newcastle BasedNSW
- CCInfrastructure Test AnalystACT
- TPICT Project CoordinatorQLD
- CCSME in Openstack, AWSNSW
- CCServiceNOW DeveloperNSW
- TPIT Project CoordinatorVIC
- CCMDM Consultant/DesignerVIC
- TP.Net DeveloperSA