As cybercriminals employ increasingly sophisticated tactics to steal identities and data, and the costs and consequences of data breaches skyrocket, here are seven steps that your small business should be taking to insulate themselves from cyberattacks.
malware in pictures
Musicians dominate the 2014 list of celebs you might not want to search on for fear of malware
The earliest worms and viruses were created for geeky fun and did little harm - oh, how times have changed. Here are 20 worms, viruses and botnets that show the evolution of malware, from Creeper to Flame.
On 26 June, Kaspersky Lab held its 10th annual Virus Analysts Summit in Dubrovnik, Croatia. At the event the company's chief security researchers discussed the latest online threats to target businesses and consumers.
Researchers from Kaspersky Lab have developed a method of decrypting files affected with the latest version of CryptXXX, a malware program that combines ransomware and information stealing capabilities.
The Petya ransomware now bundles a second file-encrypting program for cases where it cannot replace a computer's master boot record to encrypt its file table.
Two vulnerabilities recently patched in 7-Zip could put many software products and devices who bundle the open-source file archiving library at risk of compromise.
A group of cybercriminals have combined two powerful malware programs to create a new online banking Trojan that has already stolen million dollars from customers of 24 US and Canadian banks.
A start-up company called Karamba Security has developed malware prevention technology for the externally connected electronic control units (ECUs) found in cars.
Flash drives are virus magnets. This is a generally accepted truth, but today I learned it firsthand.
Tami asked the Antivirus & Security Software forum why friends are receiving spam that appears to come from her.
SUPERAntiSpyware found three Trojans on a reader's PC. He asked the <a href="http://forums.pcworld.com/index.php?/forum/2000-windows/">Windows</a> forum how this could happen when his PC is protected.
You wouldn't let your kids walk the streets of Amsterdam's Red Light District, but giving them unrestricted access to the Web is practically the same thing. The problem is, how do you block out all that inappropriate Web content?
With the 2010 FIFA World Cup set to kick off at the start of June, anti-spyware company Lavasoft has compiled a list of the top online traps to look out for.
Many people will know what it’s like to regularly click ‘close’ on the nagging Windows 10 ‘upgrade’ notification. It’s been happening every day for many months. But apparently something on one of these hundreds of fade-into-the-background notificatio...
PDF files are one of the most common, and most trusted document formats out there. However, that trust, combined with the cross-platform use of PDFs makes the Adobe file format one of the most targeted and exploited by malicious attacks as well.
Perhaps you've heard that the Apple Mac OS X operating system is simply more secure by design and not prone to the security flaws and vulnerabilities that plague the dominant Microsoft Windows operating system? Well, don't believe the hype. Apple unl...
Rootkits, a type of stealth technology used by malware malefactors, attempt to hide in the dark corners of an infected PC and evade detection. A new post out today from the Microsoft Malware Protection Center shines the spotlight on the evil tools.
2009 ushered in mobile malware with the first (and second) iPhone worm appearing just before Christmas.
Whitepapers about malware
This whitepaper discusses the results from the 2014 Cost of Data Breach Study: Australia. In this year’s report, the fifth of its kind, the total average cost paid by a company in a breach increased to $2.8 million, while assessing the likelihood of a company having data breaches in the next 24 months.
Most Popular Reviews
- 1 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 2 D-Link Taipan AC3200 Ultra tri-band modem-router review
- 3 Dell XPS 13 (2016) review: Making the very best Ultrabook
- 4 Microsoft Surface Book review: The verdict on Microsoft's first notebook
- 5 Telstra Wi-Fi 4GX Advanced III review: Testing the world's first 600Mbps wireless hotspot
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- Google wins latest round in Oracle legal battle
- Shoot an atom into silicon, and you may have the beginnings of a quantum computer
- Juniper's new access switches add to its cloud-focused lineup
- Google cleared of infringement in Oracle lawsuit over Java
- Up to a dozen banks are reportedly investigating potential SWIFT breaches
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTSolution ArchitectACT
- CCSenior Business Analyst - Integration Solution ManagementVIC
- CCOracle Fusion SOA/BPEL DeveloperVIC
- CCDigital Content ProducerVIC
- FTSolution ArchitectVIC
- CCContract Computer Operator (UNIX/Windows-based) 1610524/CCO/vmtAsia
- FTSOA Tech LeadNSW
- FTNetwork EngineerNSW
- CCContract Analyst Programmer (JAVA/J2EE) 160526/AP/506Asia
- CCBusiness Analyst - TelcoVIC
- CCIT Assistant (Office Automation/Windows) 160517/ITA/884Asia
- CCContract Analyst Programmer (J2EE/Oracle) 160520/AP/985Asia
- FTPega Operation Engineer - CEPNSW
- FTVMWare Infrastructure EngineerVIC
- CCProgram Business AnalystVIC
- FTData Feeds Developer | Financial Services | C# & SQLNSW
- CCDevOps EngineerNSW
- FTSenior Business Analysts - Payments or Disaster RecoveryVIC
- CCData Center ArchitectNSW
- FTSystems EngineerACT
- CCTest Analyst / Test LeadNSW
- FTStibo PIM Consultant - Permanent OpportunityNSW
- CCData Engineer | Real Time StreamingNSW
- CCSystems Engineer - NV2ACT
- CCDevOps Software Configuration ManagerACT