Article | 7/09/2011 Comodo CEO says DigiNotar hack was state-sponsoredAn attack on a Dutch company that issues certificates used to authenticate websites was state-sponsored, according to the chief executive of Comodo, a...
Article | 25/08/2011 Anonymous leaks nude images of BART spokesmanThe hacking group Anonymous has waged a full-on war on BART, the San Francisco subway system, over cellular shutdowns to stifle protests. Following tw...
Article | 4/08/2011 McAfee warns of massive 5-Year hacking plotEvery company in every conceivable industry is compromised by hackers - or will be shortly - according to a report from McAfee, a major maker of cybe...
Article | 3/08/2011 Cybercrime fight costing companies more this yearCybercrime cost corporations 56 percent more this year than last, according to an annual study from the Ponemon Institute and sponsored by ArcSight, a...
Article | 8/12/2008 How to set up a secure home networkA wireless connection isn't just handy when you're out and about. There are more options for going wireless at home, whether it's so you can enjoy cat...
Article | 6/12/2008 How to restrict wireless accessI like the idea of keeping a Wi-Fi network open so visitors can be welcomed into the warm Internet like Elijah to a seder. But for your business, you'...
Article | 5/02/2011 What cloud computing means for the real worldThere are more than a few critics of cloud computing, even at PCWorld; I'm probably one of them. But I've been turning over in my mind different persp...
Article | 4/02/2011 How DRM could ensure cloud securityYet another survey is indicating that security is a big issue for those intending to take up cloud computing.
Article | 9/12/2010 WikiLeaks: A case study in Web survivabilityIn recent weeks WikiLeaks has been targeted by denial-of-service (DoS) attacks, had its hosting service shutdown, been bounced off of Amazon hosting, ...
Article | 29/05/2010 Google Wi-Fi snooping should serve as security wakeup callThe continuing saga of Google's wireless snooping and the maelstrom it's generated won't end anytime soon.
Whitepapers about network security
The risks facing high-speed data networks and unencrypted data while in motion are very real and on the rise. As information becomes one of the most valuable ‘off balance sheet’ assets, protection of that information and the investment in it is a paramount obligation of office-holders and management. Read now for a better understanding of the risks to data in motion.
Best Deals on PCWorld
- NotebooksView all »
- TabletsView all »
- Mobile PhonesView all »
- Printers & ScannersView all »
- Networking, Wireless & VoIPView all »
Sign up to PC World Today for the latest news, reviews and galleries from PC World Australia.Sign up now »
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTR&D EngineerSA
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTOS Web Applications DeveloperNSW
- FTLead Software EngineerSA
- FTWeb Analyst - WebTrendsVIC
- FTTechnical Business AnalystNSW
- FTQuality ManagerSA
- FTSenior Python DeveloperNSW
- FTTest EngineerVIC
- FTFlash / ActionScript Developer - ContractNSW