Article | 3/01/2013 Ruby on Rails security updates address SQL injection flawThe developers of Ruby on Rails, a popular Web application development framework for the Ruby programming language, released versions 3.2.10, 3.1.9, a...
Article | 3/01/2013 Website of US-based gas turbine maker also rigged with new IE exploitThe attackers who recently infected the website of the Council on Foreign Relations (CFR) with an exploit for an unpatched vulnerability in Internet E...
Article | 24/12/2012 Chrome 25 will disable 'silently installed' extensionsStarting with version 25 of Google Chrome, browser extensions installed offline by other applications will not be enabled until users give their permi...
Article | 19/12/2012 Add-on that forces HTTPS for popular websites released for Internet ExplorerCloud-based security services provider Zscaler has released an implementation for Internet Explorer of the HTTPS Everywhere browser security extension...
Article | 18/12/2012 Java 7 Update 10 allows users to restrict the use of Java in browsersA recent Java 7 update allows users to completely prevent Java applications from running inside browsers or to restrict how Web-based Java content is ...
Article | 12/12/2012 Google adjusts image search to avoid accidental porn hitsGoogle has changed the way it handles image searches so that pornographic pictures are less likely to be presented to those who aren't looking for the...
Article | 11/12/2012 Bromium protects hosted desktops and Windows XP with its MicrovisorBromium has upgraded its security platform vSentry, which uses virtualization to isolate malicious code, to protect virtual desktops and old Windows X...
Article | 10/12/2012 Police-themed ransomware speaks to victims -- literallyA new variant of a Trojan program called Reveton that prevents victims from using their computers and displays rogue messages from law enforcement age...
Article | 7/12/2012 Tor network used to command Skynet botnetSecurity researchers have identified a botnet controlled by its creators over the Tor anonymity network. It's likely that other botnet operators will ...
Article | 4/12/2012 Twitter fixes SMS-based account hijacking vulnerabilityTwitter has restricted the ability of attackers to post tweets and perform other actions on behalf of many users who have phone numbers associated wit...
Article | 4/12/2012 Orange to install Lookout security software on Android devicesMobile network operator Orange will install Lookout's Mobile Security application on some of the Android-based tablets and smartphones it distributes ...
Article | 4/12/2012 Attackers can abuse Yahoo developer feature to steal user emails, other dataAttackers can read emails, contacts and other private data from the accounts of Yahoo users who visit a malicious page by abusing a feature present on...
Article | 28/11/2012 Attackers hijack the .ro domains of Google, Microsoft, Yahoo, othersThe Romanian domain names of Google, Yahoo, Microsoft, Kaspersky Lab and other companies were hijacked on Wednesday and were redirected to a hacked se...
Article | 28/11/2012 Piwik software installer rigged with back door following website compromiseAn unknown attacker inserted malicious code into the latest version of the Piwik open-source Web analytics software after compromising the project's w...
Best Deals on PCWorld
- Printers & ScannersView all »
- NotebooksView all »
- TabletsView all »
- Mobile PhonesView all »
- Networking, Wireless & VoIPView all »
Sign up to PC World Today for the latest news, reviews and galleries from PC World Australia.Sign up now »
- FTTechnical Business AnalystNSW
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTTest EngineerVIC
- FTLead Software EngineerSA
- FTSenior Python DeveloperNSW
- FTFlash / ActionScript Developer - ContractNSW
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTWeb Analyst - WebTrendsVIC
- FTQuality ManagerSA
- FTOS Web Applications DeveloperNSW
- FTR&D EngineerSA