After Symantec blew the lid on Regin on Sunday, computer security experts and companies are revealing information that has lead to suspicions that the U.S. and U.K. are involved.
For the first time since Stuxnet was discovered in 2010, researchers have publicly named the worm's original victims: five Iranian companies involved in industrial automation.
A multi-year study of cyberattacks against 10 activist and human rights groups shows they're hit with the same types of intrusions as large organizations but have far fewer resources to defend themselves.
Microsoft's Enhanced Mitigation Experience Toolkit (EMET), a security program popular with companies, was updated Monday to harden the exploit mitigations that it adds to other programs and to address compatibility issues with some of them.
A security researcher has developed a tool to demonstrate how the unauthenticated data packets in the 802.11 wireless LAN protocol can be used as a covert channel to control malware on an infected computer.
A cyberespionage group that has built its operations around a malware program called BlackEnergy has been compromising routers and Linux systems based on ARM and MIPS architectures in addition to Windows computers.
Pirate Bay co-founder Gottfrid Svartholm Warg has been sentenced by the Court of Frederiksberg in Denmark to three-and-a-half years in jail for hacking and serious vandalism.
Users of Drupal, one of the most popular content management systems, should consider their sites compromised if they didn't immediately apply a security patch released on Oct. 15.
Since 2011 a group of attackers has been targeting companies that operate industrial control systems with a backdoor program called BlackEnergy.
A coalition of security vendors has disrupted the activities of a sophisticated group of attackers tied to China that, over the past six years, infiltrated the computers of many Fortune 500 companies, journalists, environmental groups, software compa...
One of the first things a malware analyst does when encountering a suspicious executable file is to extract the text strings found inside it, because they can provide immediate clues about its purpose. This operation has long been considered safe, bu...
Network-attached storage (NAS) devices are riddled with vulnerabilities that can put the security of sensitive data and networks at risk, a researcher has found. To prove his point, he has created a proof-of-concept worm that can infect devices from ...
Isolating computers from the Internet, called "air gapping," is considered one of the best ways to defend critical systems and their sensitive data from cyberattacks, but researchers have found that can be undermined using an all-in-one printer.
A leaked programming manual for interacting with the physical components of automated teller machines might have helped attackers create malware programs that were used to steal cash from ATMs in various parts of the world this year.
The leader of the now-disbanded LulzSec hacking group directed members to attack targets in dozens of countries, including the U.K., Turkey, Brazil and Australia, even as he was serving as an FBI informant, according to a news report.
Most Popular Reviews
- 1 HTC One (M8s) review: Better value for money than HTC's flagship
- 2 Apple MacBook (early 2015) review: Almost a game changer
- 3 Microsoft Surface 3 Windows 8.1 tablet
- 4 HP Spectre x360 convertible laptop
- 5 Panasonic Lumix DMC-FT30 Tough camera
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- Fitbit looks to raise at least $358 million in IPO
- WikiLeaks raising $100k bounty for a copy of the Trans-Pacific trade pact
- Facebook says 'oui' to AI with Paris research team
- New SOHO router security audit uncovers over 60 flaws in 22 models
- R2-D2 robot fridge is the droid you're looking for
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
- FTDigital Marketing Executive | GamingNSW
- FTSenior Digital B2B Sales Manager | Household BrandNSW
- CCMobile Designer / Developer - IOSNSW
- FTKey Account ManagerNSW
- FTSENIOR FORMS ANALYST (13767)QLD
- FTSenior SQL DBANSW
- FTSMB Direct Sales Account Executive | Largest Global Online MarketplaceNSW
- CCMobile Designer / Developer - IOSNSW