Article | 23/01/2013 Mega responds to security concerns; promises some changesRepresentatives of newly launched file-storage and sharing service Mega addressed some of the concerns raised by security researchers in recent days a...
Article | 22/01/2013 Twitter flaw gave third-party apps unauthorized access to private messages, researcher saysUsers who signed into third-party Web or mobile applications using their Twitter accounts might have given those applications access to their Twitter ...
Article | 21/01/2013 Security researchers cripple Virut botnetMany of the domain names used by a cybercriminal gang to control computers infected with the Virut malware were disabled last week in a coordinated ta...
Article | 19/01/2013 Google sees one password ring to rule them allGoogle thinks it might have found an answer to the vexing problem of forgotten or weak passwords: "physical" passwords, which might come in the form o...
Article | 18/01/2013 Researchers find critical vulnerabilities in Java 7 Update 11Researchers from Security Explorations, a Poland-based vulnerability research firm, claim to have found two new vulnerabilities in Java 7 Update 11 th...
Article | 17/01/2013 Shylock banking malware updated to spread via Skype, researchers sayThe Shylock home banking malware has been updated with new functionality that allows it to spread automatically using the popular Skype Voice-over-IP ...
Article | 17/01/2013 Foxit patches critical vulnerability in PDF viewer browser plug-inFoxit released version 5.4.5 of its Foxit Reader PDF viewer plug-in on Thursday in order to address a critical remote code execution vulnerability tha...
Article | 15/01/2013 6Scan launches free website vulnerability and malware scanning service6Scan, a Web security startup based in Tel Aviv, Israel, launched a new service on Tuesday that can scan websites for security issues, like vulnerabil...
Article | 15/01/2013 Java exploit used in Red October cyberespionage attacks, researchers sayThe hundreds of government, military and research organizations targeted in a large-scale cyberespionage operation dubbed Red October were not only at...
Article | 10/01/2013 Java zero-day vulnerability actively exploited by attackersAn exploit for a previously unknown and currently unpatched vulnerability in Java is being used by cybercriminals to infect computers with malware, ac...
Article | 10/01/2013 Foxit Reader vulnerable to critical remote code execution flawFoxit Reader, a PDF viewer application often used as an alternative to the more popular Adobe Reader, contains a critical vulnerability in its browser...
Article | 8/01/2013 Privacy advocates welcome Yahoo Mail HTTPS roll-outDigital rights and privacy advocates have welcomed Yahoo's decision to provide its users with an option to enable HTTPS (HTTP Secure) for their entire...
Article | 7/01/2013 Adobe warns of actively exploited ColdFusion flawsAdobe Systems warned users of its ColdFusion application server software that hackers are reportedly exploiting unpatched vulnerabilities in the produ...
Best Deals on PCWorld
- Networking, Wireless & VoIPView all »
- NotebooksView all »
- TabletsView all »
- Mobile PhonesView all »
- Printers & ScannersView all »
Sign up to PC World Today for the latest news, reviews and galleries from PC World Australia.Sign up now »
- FTQuality ManagerSA
- FTR&D EngineerSA
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTTest EngineerVIC
- FTLead Software EngineerSA
- FTOS Web Applications DeveloperNSW
- FTSenior Python DeveloperNSW
- FTTechnical Business AnalystNSW
- FTFlash / ActionScript Developer - ContractNSW
- FTWeb Analyst - WebTrendsVIC