As cybercriminals employ increasingly sophisticated tactics to steal identities and data, and the costs and consequences of data breaches skyrocket, here are seven steps that your small business should be taking to insulate themselves from cyberattacks.
malware in pictures
Musicians dominate the 2014 list of celebs you might not want to search on for fear of malware
The earliest worms and viruses were created for geeky fun and did little harm - oh, how times have changed. Here are 20 worms, viruses and botnets that show the evolution of malware, from Creeper to Flame.
On 26 June, Kaspersky Lab held its 10th annual Virus Analysts Summit in Dubrovnik, Croatia. At the event the company's chief security researchers discussed the latest online threats to target businesses and consumers.
A new Android malware has managed to steal access to more than 1 million Google accounts, and it continues to infect new devices, according to security firm Checkpoint.
A new open-source tool called MBRFilter can protect the master boot record of Windows computers from modification by ransomware and other malicious attacks.
Yes, even bad-guy malware developers have to keep their "customers" happy. Read what happens when F-Secure tests the "help desks" of four crypto-locking malware makers.
A newly discovered fake Pokemon Go game will actually lock your phone and then secretly run in the background, clicking on porn ads.
Antivirus vendor Avast Software has agreed to buy rival AVG Technologies for US$1.3 billion in cash.
Has a malware infection taken your PC hostage? Here's how to clean it out and restore your PC to a pristine state.
Flash drives are virus magnets. This is a generally accepted truth, but today I learned it firsthand.
Tami asked the Antivirus & Security Software forum why friends are receiving spam that appears to come from her.
SUPERAntiSpyware found three Trojans on a reader's PC. He asked the <a href="http://forums.pcworld.com/index.php?/forum/2000-windows/">Windows</a> forum how this could happen when his PC is protected.
You wouldn't let your kids walk the streets of Amsterdam's Red Light District, but giving them unrestricted access to the Web is practically the same thing. The problem is, how do you block out all that inappropriate Web content?
Advanced Persistent Threats (APTs) are the plague of enterprise security, crippling businesses and IT careers through costly data breaches and massive losses. Their goal is to steal intellectual property, and confidential company information. They ro...
Many people will know what it’s like to regularly click ‘close’ on the nagging Windows 10 ‘upgrade’ notification. It’s been happening every day for many months. But apparently something on one of these hundreds of fade-into-the-background notificatio...
PDF files are one of the most common, and most trusted document formats out there. However, that trust, combined with the cross-platform use of PDFs makes the Adobe file format one of the most targeted and exploited by malicious attacks as well.
Perhaps you've heard that the Apple Mac OS X operating system is simply more secure by design and not prone to the security flaws and vulnerabilities that plague the dominant Microsoft Windows operating system? Well, don't believe the hype. Apple unl...
Rootkits, a type of stealth technology used by malware malefactors, attempt to hide in the dark corners of an infected PC and evade detection. A new post out today from the Microsoft Malware Protection Center shines the spotlight on the evil tools.
Whitepapers about malware
This whitepaper discusses the results from the 2014 Cost of Data Breach Study: Australia. In this year’s report, the fifth of its kind, the total average cost paid by a company in a breach increased to $2.8 million, while assessing the likelihood of a company having data breaches in the next 24 months.
Epson EcoTank Expression ET-2500
Epson WorkForce ET-4550
Everki ContemPRO Roll Top Laptop Backpack
Linksys AC5400 MU-MIMO Gigabit router
Samsung portable 1TB T3 drive
Microsoft L5V-00027 Sculpt Ergonomic Keyboard Desktop
Smart LED Bulb LB130
Lexar® JumpDrive® S57 USB 3.0 flash drive
UE Boom 2 Bluetooth speaker
Lexar® Portable SSD
Lexar® JumpDrive® S45 USB 3.0 flash drive
Huawei Mate 9
Logitech G403 Prodigy mouse
Google Daydream VR headset
Belkin MIXIT Metallic Lightning to USB Cable
Acer Swift 7
3SIXT Ultra HD Sports Action Camera
Epson WorkForce DS-360W
Surface Pro 4
Garmin Fenix Chronos smartwatch
Lexar® Professional 1800x microSDHC™/microSDXC™ UHS-II cards
Dell Inspiron 5000 series 2-in-1
Audio-Technica ATH-ANC70 Noise Cancelling Headphones
HD Pan/Tilt Wi-Fi Camera with Night Vision NC450
Dell XPS 13 laptop
HP Pavilion x360 13”
Lexar® JumpDrive® C20c USB Type-C flash drive
Blade 28 backpack by Arc’teryx
Most Popular Reviews
- 1 Huawei Mate 9 full in-depth smartphone review
- 2 ZTE Axon 7 review: Is ZTE dumping old stock on Australia?
- 3 Oppo R9s smartphone full review
- 4 Huawei Nova Plus smartphone review
- 5 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
Join the PC World newsletter!
Latest News Articles
- US probe of drone collisions with aircraft points to birds
- Panasonic Blu-ray recorder PVR set-top box review
- Alphabet's Waymo raises stakes in self-driving race with Uber lawsuit
- Stop using SHA1: It’s now completely unsafe
- Google's new AI aims to end abusive online comments using 'Perspective'
PCW Evaluation Team
I’d happily recommend this touchscreen laptop and Windows 10 as a great way to get serious work done at a desk or on the road.
Ultimately, I think the Windows 10 environment is excellent for me as it caters for so many different uses. The inclusion of the Xbox app is also great for when you need some downtime too!
For me, the Xbox Play Anywhere is a great new feature as it allows you to play your current Xbox games with higher resolutions and better graphics without forking out extra cash for another copy. Although available titles are still scarce, but I’m sure it will grow in time.
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
- How to quit Pokemon Go (or to start enjoying it again)
- Huawei Mate 9 full in-depth smartphone review
- Time to ditch Foxtel and the iQ3: How to replace Foxtel packages with cheaper alternatives
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- FTSalesforce Technical Consultant/Architect Global IT Company - SydneyNSW
- CCSenior Technical SpecialistNSW
- FTDynamics AX Functional Consultant (Sales & Marketing Modules)NSW
- CCSenior System AdministratorVIC
- FTDynamics AX Functional Consultant (Sales & Marketing Modules)WA
- TPSenior Business Project ManagerNSW
- CCNetwork EngineerNSW
- CCSAP/ Nakisa Implementation ConsultantQLD
- FTSenior Software Engineer x 2 - Positive Vetting, NV2 or NV1 required!!!!SA
- FTSupport Analyst / Production Support - InformaticaNSW
- FTDynamics AX Functional Consultant (Supply Chain Modules)VIC
- FTSalesforce AdministratorQLD
- FTSenior Project Manager - PERMANENTACT
- FTStorage Solution ArchitectVIC
- CCProject Support SpecialistVIC
- TPMobile DeveloperWA
- TPGIS Developer - 6 month ContractQLD
- FTInfrastructure Architect (Adelaide Based)VIC
- FTDeveloper - XML & JavaVIC
- TPProject ManagerOther
- FTJunior Software Engineer - Positive Vetting, NV2 or NV1 requiredSA
- FT.Net DeveloperVIC
- TPDesktop Support OfficerQLD
- FTDeveloper - Java/J2EEQLD
- FTApplications DeveloperACT