Security researchers have shown that carefully crafted text messages sent to cell phones via short message service (SMS) can cause them to shutdown without the knowledge of the owner.
When the popular Web site Gawker was hacked into recently, more than a million user IDs and passwords were released. If you were one of the people compromised that's annoying -- very annoying. Not that it's a big deal that someone could log into a go...
Depending on whom you ask, paying for antivirus software is either a good investment or a total ripoff. In reality, neither viewpoint is accurate. You can find plenty of good reasons to choose a paid antivirus product, and plenty of good reasons to ...
If YouTube started as a place for people to upload low-res videos, Google's global 2010 'most popular' video list shows just how fast the model is evolving into something nakedly commercial.
This end-of-year article is a looking forward one -- looking forward to a year in which the Internet will be under a multi-pronged attack that threatens to change it irrevocably in ways that may destroy much of the Internet's potential.
It's been All WikiLeaks, All the Time here in Cringeville lately. And why not? As I noted last time out, this is the biggest thing to hit the WebberNets since Tim Berners Lee dreamed it up 20 years ago. We're still unraveling the implications and pro...
In recent weeks WikiLeaks has been targeted by denial-of-service (DoS) attacks, had its hosting service shutdown, been bounced off of Amazon hosting, had its funding through PayPal, MasterCard and other sources shut down, and its leader arrested on s...
Perhaps you've heard that the Apple Mac OS X operating system is simply more secure by design and not prone to the security flaws and vulnerabilities that plague the dominant Microsoft Windows operating system? Well, don't believe the hype. Apple unl...
Virtualizing x86 infrastructure isn't just a one-step process -- as servers change, the whole data center must change as well. While server hypervisors such as VMware's ESX, Microsoft's Hyper-V and Xen can make IT more efficient and cost-effective, m...
It's unlike any conference badge you've seen before. Sleek, stylish, programmable, and made out of metal. It's the Defcon 18 conference badge. Unveiled at the annual hacker conference in Las Vegas, here's a first look at this year's badge.
Businesses are eyeing a transition to Microsoft Windows 7, and with a wealth of security features that are part of it, it's worth figuring out the good and bad about each of them, says Gartner analyst Neil MacDonald, who notes in some cases, third-pa...
While apologies from BP to the world regarding its environmental disaster and even from a U.S. Congressman to BP have stolen headlines of late, the tech industry has not been without its fair share of apologies during the first half of 2010 either.
In May, Web security consultant George Deglin discovered a cross-site scripting (XSS) exploit that involved Facebook's controversial Instant Personalization feature. The exploit ran on Yelp, one of the three sites that Facebook had selected to test I...
Who's got the safest operating system? Apple, Google, Microsoft? According to one security expert, what really matters is who's using the OS.
The continuing saga of Google's wireless snooping and the maelstrom it's generated won't end anytime soon.
Most Popular Reviews
- 1 Huawei P9 review: lifting photography to another level... sometimes.
- 2 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 3 D-Link Taipan AC3200 Ultra tri-band modem-router review
- 4 Dell XPS 13 (2016) review: Making the very best Ultrabook
- 5 Microsoft Surface Book review: The verdict on Microsoft's first notebook
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- HPE has won $3 billion in a lawsuit against Oracle
- Tesla's autopilot is being investigated after a fatal crash
- This mobile Trojan from China fills your phone with porn apps
- Eyefi leaves some card owners stranded, highlighting IoT hazards
- DNC hacker Guccifer 2.0 denies Russian links and mocks security firms
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
- CCSenior IT Automated TesterNSW
- FTIT Project Coordinator- Data Center Infrastructure backgroundNSW
- CCScrum MasterNSW
- CCSr Business Analyst FI/CO, ERP, Procurement, Payroll, HR, SAPNSW
- FTBusiness Analyst/Data Analyst Capability ManagerVIC
- CCICT PreSales SpecialistVIC
- FTBusiness Analyst - Toolset ReadinessNSW
- CCSpatial DeveloperQLD
- FTNV2 Defence Project ManagerACT
- CCContract Analyst Programmer (J2EE/JAVA/SQL) 160621/AP/082Asia
- CCContract Junior Programmer (JAVA / SQL) 160621/JP/224Asia
- FTJunior Web DeveloperSA
- CCBusiness Analyst - Healthcare industryVIC
- FTSolution Architect - Data/ InformationVIC
- CCBusiness Impact AssessmentsVIC
- CCSenior Project ManagerNSW
- CCSenior Change Manager, Financial ServicesNSW
- CCProgrammer (IT Security/Website Administration) 160711/P/565Asia
- FTTechnical Lead - Tier 1 Customer interfaceACT
- CCOracle iLearning Business AnalystNSW
- CCSenior Business Analyst- BPMN, Testing backgroundNSW
- CCIT Assistant (Lotus Notes/Technical Support) 160616/ITA/991Asia
- CCInfrastructure Solutions ArchitectNSW
- CCUrgent requirement for a Splunk SMEVIC