Security researchers from Kaspersky Lab have identified a spam message campaign on Skype that spreads a piece of malware with Bitcoin mining capabilities.
Organizations face malware-related events that bypass traditional defense technologies on their networks every three minutes, according to a new report released Wednesday by security vendor FireEye.
Researchers from security vendor FireEye have uncovered a new APT (advanced persistent threat) that uses multiple detection evasion techniques, including the monitoring of mouse clicks, to determine active human interaction with the infected computer...
An analysis of a piece of Android spyware targeting a prominent Tibetan political figure suggests it may have been built to figure out the victim's exact location.
The authors of police-themed ransomware have started using the browsing histories from infected computers in order to make their scams more believable, according to an independent malware researcher.
A global credit card fraud network was shut down on Thursday as the result of an international police operation called "Pandora-Storm" that saw the participation of 20 law enforcement agencies from Europe, America and Australia, Europol announced,
A new piece of malware that infects point-of-sale (POS) systems has already been used to compromise thousands of payment cards belonging to customers of U.S. banks, according to researchers from Group-IB, a security and computer forensics company bas...
A piece of malicious software spotted by Trend Micro uses the note-taking service Evernote as a place to pick up new instructions.
Most browser installations use outdated versions of the Java plug-in that are vulnerable to at least one of several exploits currently used in popular Web attack toolkits, according to statistics published Monday by security vendor Websense.
Security researchers from antivirus vendor Kaspersky Lab have identified a targeted email attack against human rights and political activists that distributed a custom Android Trojan app with information-stealing capabilities.
A new version of the TDL rootkit-type malware program downloads and abuses an open-source library called the Chromium Embedded Framework that allows developers to embed the Chromium Web rendering engine inside their own applications, according to sec...
A new piece of custom malware sold on the underground Internet market is being used to siphon payment card data from point-of-sale (POS) systems, according to security researchers from antivirus vendor McAfee.
Security researchers have uncovered yet another ongoing cyberespionage operation targeting political and human rights activists, government agencies, research organizations and industrial manufacturers primarily from Eastern European countries and fo...
Security vendors analyzing the code used in the cyberattacks against South Korea are finding nasty components designed to wreck infected computers.
An anonymous researcher created a massive botnet by hijacking about 420,000 Internet-accessible embedded devices with default or no login passwords and used it to map the entire Internet.
Linksys AC5400 MU-MIMO Gigabit router
Epson WorkForce ET-4550
Epson EcoTank Expression ET-2500
Samsung portable 1TB T3 drive
Smart LED Bulb LB130
Everki ContemPRO Roll Top Laptop Backpack
Microsoft L5V-00027 Sculpt Ergonomic Keyboard Desktop
UE Boom 2 Bluetooth speaker
Lexar® JumpDrive® S57 USB 3.0 flash drive
Acer Swift 7
Lexar® Portable SSD
3SIXT Ultra HD Sports Action Camera
Belkin MIXIT Metallic Lightning to USB Cable
Logitech G403 Prodigy mouse
Lexar® JumpDrive® S45 USB 3.0 flash drive
Google Daydream VR headset
Huawei Mate 9
Epson WorkForce DS-360W
Surface Pro 4
Dell Inspiron 5000 series 2-in-1
HP Pavilion x360 13”
Lexar® Professional 1800x microSDHC™/microSDXC™ UHS-II cards
Lexar® JumpDrive® C20c USB Type-C flash drive
Garmin Fenix Chronos smartwatch
HD Pan/Tilt Wi-Fi Camera with Night Vision NC450
Audio-Technica ATH-ANC70 Noise Cancelling Headphones
Blade 28 backpack by Arc’teryx
Dell XPS 13 laptop
Most Popular Reviews
- 1 Oppo R9s Plus phone: Full, in-depth review
- 2 Samsung 2017 QLED Q7 TV: Full, in-depth review
- 3 HTC U Ultra phone full, in-depth review
- 4 Gigabyte Aorus GA-AX370-Gaming 5 AMD Ryzen AM4 motherboard review
- 5 Kogan curved 4K UHD 55-inch LED LCD TV review
Join the PC World newsletter!
Latest News Articles
- GeForce GTX 1060 added to Nvidia's For Honor, Ghost Recon: Wildlands free game bundle
- Razer’s updated Blade Pro is the first ever THX-certified laptop
- Microsoft OneNote for beginners: Everything you need to know
- Subaru XV 2017 review
- Samsung Galaxy A5 2017 phone: Full, in-depth review
PCW Evaluation Team
A smarter way to print for busy small business owners, combining speedy printing with scanning and copying, making it easier to produce high quality documents and images at a touch of a button.
I've had a multifunction printer in the office going on 10 years now. It was a neat bit of kit back in the day -- print, copy, scan, fax -- when printing over WiFi felt a bit like magic. It’s seen better days though and an upgrade’s well overdue. This HP OfficeJet Pro 8730 looks like it ticks all the same boxes: print, copy, scan, and fax. (Really? Does anyone fax anything any more? I guess it's good to know the facility’s there, just in case.) Printing over WiFi is more-or- less standard these days.
As a freelance writer who is always on the go, I like my technology to be both efficient and effective so I can do my job well. The HP OfficeJet Pro 8730 Inkjet Printer ticks all the boxes in terms of form factor, performance and user interface.
I’d happily recommend this touchscreen laptop and Windows 10 as a great way to get serious work done at a desk or on the road.
Ultimately, I think the Windows 10 environment is excellent for me as it caters for so many different uses. The inclusion of the Xbox app is also great for when you need some downtime too!
For me, the Xbox Play Anywhere is a great new feature as it allows you to play your current Xbox games with higher resolutions and better graphics without forking out extra cash for another copy. Although available titles are still scarce, but I’m sure it will grow in time.
- Samsung Galaxy A5 2017 phone: Full, in-depth review
- LG G6: unboxing, hands on review and detail shots
- And the 2017 winner of the Formula 1 Best Pit Lane Boom Gantry is...
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- FTSocial Media ExecutiveNSW
- CCSenior Business Analyst (BPMN or UML & Agile)QLD
- CCTechnical Business Analyst (Security) - Finance - Contract - Sydney CBDNSW
- FTBusiness Solution Architect, Supply ChainNSW
- FTLevel 2 Technical Support OfficerQLD
- TPBusiness Implementation ManagerNSW
- FTBusiness Solutions AnalystNSW
- TPAgile Project Manager. Lean ProductivityNSW
- CCApplication Architect - CloudVIC
- TPSAP BA - Source to PayQLD
- FTWorkforce AnalystNSW
- CCApplication Support Specialist- Bathurst or Port MacquarieNSW
- FTSenior Desktop Engineer - SCCM / AD / 2012 ServerNSW
- TPTest AnalystNSW
- CCWintel Engineers - NV1ACT
- TPSenior Project CoordinatorVIC
- CCFull Stack DeveloperQLD
- FTBusiness Change Lead, OrganisationalNSW
- TPBusiness AnalystQLD
- FTNetwork Services ManagerQLD
- FTSenior Java DeveloperQLD
- CCNetwork and Cloud SMENSW
- TPAgile Implementation LeadNSW
- FTSCCM AdministratorACT
- FTSoftware Development ManagerACT