Article | 17/04/2013 CISPA sponsor compares opponents to 14-year-oldsThe chief sponsor of the Cyber Intelligence Sharing and Protection Act (CISPA) in the U.S. Congress has ignited a Twitter storm by suggesting many opp...
Article | 17/04/2013 White House threatens to veto CISPA ahead of voteThe White House has threatened to veto the controversial Cyber Intelligence Sharing and Protection Act (CISPA) in its present form, citing concerns th...
Article | 16/04/2013 Pirate Bay co-founder charged with hacking IBM mainframes, stealing moneyPirate Bay co-founder Gottfrid Svartholm Warg was charged with hacking the IBM mainframe of Logica, a Swedish IT firm that provided tax services to th...
Article | 15/04/2013 Money can't buy privacy in Google Play store, study showsPaying for an app in Google's online store, Google Play, will banish nagging in-app ads, but it won't dam the flow of personal information from your p...
Article | 15/04/2013 US House to vote on CISPA cyberthreat bill this weekThe Cyber Intelligence Sharing and Protection Act (CISPA), a controversial cyberthreat information-sharing bill, will be debated on the floor of the U...
Article | 15/04/2013 Find My Mac both useful and frustrating for law enforcementFind My Mac can be used to show the location of a stolen Mac, but the service often does not provide enough evidence to obtain a search warrant and ge...
Article | 11/04/2013 Critics: CISPA still a government surveillance billA U.S. House of Representatives committee failed to make the changes necessary to allay fears about government surveillance in a controversial cyberth...
Article | 11/04/2013 Twitter OAuth feature can be abused to hijack accounts, researcher saysA feature in the Twitter API (application programming interface) can be abused by attackers to launch credible social engineering attacks that would g...
Article | 11/04/2013 Hackers could start abusing electric car chargers to cripple the grid, researcher saysHackers could use vulnerable charging stations to prevent the charging of electric vehicles in a certain area, or possibly even use the vulnerabilitie...
Article | 10/04/2013 EU watchdog: Data collection can't fly under 'user experience' flag“Improving users' experience” is not justification for using consumer information in Big Data projects according to Europe's top data protection offic...
Article | 10/04/2013 Hackers turn a Canon EOS camera into a remote surveillance toolThe high-end Canon EOS-1D X camera can be hacked for use as a remote surveillance tool, with images remotely downloaded, erased and uploaded, a resear...
Article | 9/04/2013 Mobile phone apps view private data more than necessary, says French studyMobile phone apps are accessing users' private data and transmitting it to remote servers far more than appears strictly necessary, while users have i...
Article | 9/04/2013 5 Facebook Home privacy factsLast week, Facebook released new software for Android phones called "Home." The software is a set of apps that you can download to put Facebook photos...
Article | 8/04/2013 Companies should ban Facebook Home, experts saySocial network's new overlay for Android smartphones 'would be the first thing I would block on my network,' said one security adviser
Best Deals on PCWorld
- Printers & ScannersView all »
- NotebooksView all »
- TabletsView all »
- Mobile PhonesView all »
- Networking, Wireless & VoIPView all »
Sign up to PC World Today for the latest news, reviews and galleries from PC World Australia.Sign up now »
- FTSenior Python DeveloperNSW
- FTFlash / ActionScript Developer - ContractNSW
- FTTest EngineerVIC
- FTOS Web Applications DeveloperNSW
- FTQuality ManagerSA
- FTLead Software EngineerSA
- FTTechnical Business AnalystNSW
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTWeb Analyst - WebTrendsVIC
- FTR&D EngineerSA
- FT.NET - Sitecore Developer - Melbourne - PermNSW