Article | 15/01/2013 Java exploit used in Red October cyberespionage attacks, researchers sayThe hundreds of government, military and research organizations targeted in a large-scale cyberespionage operation dubbed Red October were not only at...
Article | 14/01/2013 Diplomatic and government agencies targeted in years-long cyberespionage operationUnidentified attackers stole sensitive information from hundreds of diplomatic, government, research and military organizations from around the world ...
Article | 21/12/2012 Poor SCADA security will keep attackers and researchers busy in 2013An increasing number of vulnerability researchers will focus their attention on industrial control systems (ICS) in the year to come, but so will cybe...
Article | 17/12/2012 Improved Carberp banking malware will target North American banks, Group-IB saysThe creators of Carberp, a banking Trojan program used exclusively in Russian-speaking countries, have started to sell an improved version of the malw...
Article | 17/12/2012 Another data-wiping malware program found in IranA new piece of malware that deletes entire partitions and user files from infected computers has been found in Iran, according to an alert issued Sund...
Article | 14/12/2012 SMS stealing apps uploaded to Google Play by Carberp banking malware gangSeveral malicious Android apps designed to steal mobile transaction authentication numbers (mTANs) sent by banks to their customers over SMS (Short Me...
Article | 7/12/2012 Tor network used to command Skynet botnetSecurity researchers have identified a botnet controlled by its creators over the Tor anonymity network. It's likely that other botnet operators will ...
Article | 28/11/2012 Attackers hijack the .ro domains of Google, Microsoft, Yahoo, othersThe Romanian domain names of Google, Yahoo, Microsoft, Kaspersky Lab and other companies were hijacked on Wednesday and were redirected to a hacked se...
Article | 30/10/2012 Lack of abuse detection allows cloud computing instances to be used like botnets, study saysSome cloud providers fail to detect and block malicious traffic originating from their networks, which provides cybercriminals with an opportunity to ...
Article | 21/12/2011 Antivirus software sales expected to show strong growth in 2012The prevalence with which hackers are handing out headaches to IT security pros will have a big upside for vendors in the coming year, according to ne...
Article | 29/11/2011 Trojan sends premium-rate SMS messages, aims at European and Canadian Android usersA new Android Trojan program that poses as an SMS management application is sending text messages to predefined premium-rate numbers in Europe and Can...
Article | 12/11/2011 Duqu authors sprinkle humor in dangerous codeFor all of the concern around Duqu, the most discussed piece of malicious software since Stuxnet, the latest analysis of its code shows its writers ha...
Article | 29/10/2011 Number of fake antivirus attacks has decreased considerably, researchers sayThe frequency of attacks that distribute fake antivirus software, a long-time pillar of the underground economy, has decreased considerably in recent ...
Best Deals on PCWorld
- Networking, Wireless & VoIPView all »
- NotebooksView all »
- TabletsView all »
- Mobile PhonesView all »
- Printers & ScannersView all »
Sign up to PC World Today for the latest news, reviews and galleries from PC World Australia.Sign up now »
- FTSenior Python DeveloperNSW
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTOS Web Applications DeveloperNSW
- FTR&D EngineerSA
- FTTechnical Business AnalystNSW
- FTLead Software EngineerSA
- FTFlash / ActionScript Developer - ContractNSW
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTWeb Analyst - WebTrendsVIC
- FTTest EngineerVIC
- FTQuality ManagerSA
- FTTechnical Consulting ManagerNSW