A security firm is warning that a group of Russian hackers known for targeting military, government and media organizations is now preparing to attack banks in the US and elsewhere.
Tens of thousands of home routers have been infected with malware, and are being used by hackers to launch distributed denial-of-service (DDoS) attacks, including by the hacktivist group Anonymous.
A team of anonymous developers who recently created a Linux rootkit that runs on graphics cards has released a new proof-of-concept malware program that does the same on Windows. A Mac OS X implementation is also in the works.
Australians have been targeted with a Breaking Bad-themed crypto ransomware.
In the latest attack involving malicious advertisements, hackers managed to launch Flash Player exploits against the visitors of several popular porn websites.
A team of developers has created a rootkit for Linux systems that uses the processing power and memory of graphics cards instead of CPUs in order to remain hidden.
Over five percent of browser visits to Google owned websites, including Google Search, are altered by computer programs that inject ads into pages. One called Superfish is responsible for a majority of those ad injections.
Cybercriminals are increasingly copying cyberespionage groups in using targeted attacks against their victims instead of large-scale, indiscriminate infection campaigns.
A new type of malware resorts to crippling a computer if it is detected during security checks, a particularly catastrophic blow to its victims.
Microsoft is betting that good security support will be key to keeping its enterprise customers from straying to rivals.
Some users whose computers have been infected with a ransomware program called TeslaCrypt might be in luck: security researchers from Cisco Systems have developed a tool to recover their encrypted files.
Some of the world's leading cryptographers are concerned about the increasing number of malicious programs that hold computers and mobile phones to ransom, in many cases by abusing the encryption algorithms they designed.
If you can't wait for that critical patch to secure your system from some just-discovered bug, IT security firm Qualys may have an answer, through new security software that can secure the trouble spot until the patch arrives.
The group of attackers behind cyberintrusions at the White House and the Department of State last year used malware that bears strong similarities to cyberespionage tools suspected to be of Russian origin.
Google plans to serve most of its ads over encrypted HTTPS connections by the end of June, a move that will protect against some ad hijacking attacks and will encourage website owners to enable encryption on their Web properties.
Epson EcoTank Expression ET-2500
Linksys AC5400 MU-MIMO Gigabit router
Microsoft L5V-00027 Sculpt Ergonomic Keyboard Desktop
Samsung portable 1TB T3 drive
Epson WorkForce ET-4550
Smart LED Bulb LB130
Lexar® JumpDrive® S57 USB 3.0 flash drive
UE Boom 2 Bluetooth speaker
Everki ContemPRO Roll Top Laptop Backpack
Huawei Mate 9
Epson WorkForce DS-360W
Lexar® JumpDrive® S45 USB 3.0 flash drive
Lexar® Portable SSD
Google Daydream VR headset
Belkin MIXIT Metallic Lightning to USB Cable
Acer Swift 7
3SIXT Ultra HD Sports Action Camera
Logitech G403 Prodigy mouse
HP Pavilion x360 13”
Garmin Fenix Chronos smartwatch
Audio-Technica ATH-ANC70 Noise Cancelling Headphones
Surface Pro 4
Blade 28 backpack by Arc’teryx
Lexar® JumpDrive® C20c USB Type-C flash drive
Dell Inspiron 5000 series 2-in-1
HD Pan/Tilt Wi-Fi Camera with Night Vision NC450
Dell XPS 13 laptop
Lexar® Professional 1800x microSDHC™/microSDXC™ UHS-II cards
Most Popular Reviews
- 1 LG G6 phone: full, in-depth review
- 2 Samsung Galaxy A5 2017 phone: Full, in-depth review
- 3 Oppo R9s Plus phone: Full, in-depth review
- 4 Samsung 2017 QLED Q7 TV: Full, in-depth review
- 5 HTC U Ultra phone full, in-depth review
Join the PC World newsletter!
Latest News Articles
- In mining user data, US ISPs must weigh cash vs. privacy
- HelloSign branches out to fix frustrating forms
- Staying alive: DDR5 memory is on its way
- Windows 10 Creators Update rolls ahead with early access and date for phones
- US Senator: Russia used 'thousands' of internet trolls during election
PCW Evaluation Team
A smarter way to print for busy small business owners, combining speedy printing with scanning and copying, making it easier to produce high quality documents and images at a touch of a button.
I've had a multifunction printer in the office going on 10 years now. It was a neat bit of kit back in the day -- print, copy, scan, fax -- when printing over WiFi felt a bit like magic. It’s seen better days though and an upgrade’s well overdue. This HP OfficeJet Pro 8730 looks like it ticks all the same boxes: print, copy, scan, and fax. (Really? Does anyone fax anything any more? I guess it's good to know the facility’s there, just in case.) Printing over WiFi is more-or- less standard these days.
As a freelance writer who is always on the go, I like my technology to be both efficient and effective so I can do my job well. The HP OfficeJet Pro 8730 Inkjet Printer ticks all the boxes in terms of form factor, performance and user interface.
I’d happily recommend this touchscreen laptop and Windows 10 as a great way to get serious work done at a desk or on the road.
Ultimately, I think the Windows 10 environment is excellent for me as it caters for so many different uses. The inclusion of the Xbox app is also great for when you need some downtime too!
For me, the Xbox Play Anywhere is a great new feature as it allows you to play your current Xbox games with higher resolutions and better graphics without forking out extra cash for another copy. Although available titles are still scarce, but I’m sure it will grow in time.
- LG G6 phone: full, in-depth review
- Samsung Galaxy A5 2017 phone: Full, in-depth review
- And the 2017 winner of the Formula 1 Best Pit Lane Boom Gantry is...
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- FTSocial Media ExecutiveNSW
- CCSystems EngineerACT
- FTCloud Infrastructure Specialist - Azure/AWSNSW
- FTSenior Java Applications DeveloperVIC
- FTSecurity Monitoring SpecialistVIC
- FTSeeking all Java Developers!VIC
- TPBusiness Project Manager - DigitalNSW
- CCIT Business Analyst - UX DesignNSW
- FTInfrastructure ArchitectWA
- FTSAP Payroll and Time ConsultantVIC
- CCSolution Designer (Teradata) - Finance - Contract - Sydney CBDNSW
- FTDatabase Modelling SpecialistVIC
- CCBusiness AnalystNSW
- FTfinance Project Manager (Workforce Management)NSW
- FTFull Stack Web Developer .NET or JAVANSW
- FTDatabase Modelling SpecialistACT
- CCDB2 System ProgrammerVIC
- FTBusiness Development ManagerVIC
- CCTSM SpecialistNSW
- CCHyperion SpecialistQLD
- CCSolution ManagerSA
- FTBusiness Solutions AnalystNSW
- FTETL Informatica DeveloperNSW
- FTProject CoordinatorVIC
- FTSenior C++ EngineerACT