In recent weeks WikiLeaks has been targeted by denial-of-service (DoS) attacks, had its hosting service shutdown, been bounced off of Amazon hosting, had its funding through PayPal, MasterCard and other sources shut down, and its leader arrested on s...
Perhaps you've heard that the Apple Mac OS X operating system is simply more secure by design and not prone to the security flaws and vulnerabilities that plague the dominant Microsoft Windows operating system? Well, don't believe the hype. Apple unl...
Virtualizing x86 infrastructure isn't just a one-step process -- as servers change, the whole data center must change as well. While server hypervisors such as VMware's ESX, Microsoft's Hyper-V and Xen can make IT more efficient and cost-effective, m...
It's unlike any conference badge you've seen before. Sleek, stylish, programmable, and made out of metal. It's the Defcon 18 conference badge. Unveiled at the annual hacker conference in Las Vegas, here's a first look at this year's badge.
Businesses are eyeing a transition to Microsoft Windows 7, and with a wealth of security features that are part of it, it's worth figuring out the good and bad about each of them, says Gartner analyst Neil MacDonald, who notes in some cases, third-pa...
While apologies from BP to the world regarding its environmental disaster and even from a U.S. Congressman to BP have stolen headlines of late, the tech industry has not been without its fair share of apologies during the first half of 2010 either.
In May, Web security consultant George Deglin discovered a cross-site scripting (XSS) exploit that involved Facebook's controversial Instant Personalization feature. The exploit ran on Yelp, one of the three sites that Facebook had selected to test I...
Who's got the safest operating system? Apple, Google, Microsoft? According to one security expert, what really matters is who's using the OS.
The continuing saga of Google's wireless snooping and the maelstrom it's generated won't end anytime soon.
Whatever you use to surf the Web needs a fix. Developers of all five major browsers--Chrome, Firefox, Internet Explorer, Safari, and Opera--recently released important security patches.
Once upon a time, instant messaging was a consumer technology. That consumer toy worked its way into the corporate network and was eventually not just accepted, but embraced and leveraged as a valuable tool.
Last week a flawed DAT file from McAfee led to false positives crashing Windows XP systems and leading to a massive cleanup effort. It would be very easy to simply point the finger at McAfee, terminate the employment of a scapegoat security engineer ...
In 1993, Private Investigator Joe Seanor had wrapped up employment stints in the CIA and the Department of Justice, and was looking for something new in his professional life.
The last thing any of us need these days is another uninformed discourse on health care, but I tend to wade in where others have the common sense to keep out.
iPhones appear to pose greater security risks than Android, Blackberry and Nokia smart phones, but is this really the case? An nCircle survey says yes, security expert Charlie Miller says not necessarily, and Pwn2Own sponsor TippingPoint won't say.
Most Popular Reviews
- 1 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 2 D-Link Taipan AC3200 Ultra tri-band modem-router review
- 3 Dell XPS 13 (2016) review: Making the very best Ultrabook
- 4 Microsoft Surface Book review: The verdict on Microsoft's first notebook
- 5 Telstra Wi-Fi 4GX Advanced III review: Testing the world's first 600Mbps wireless hotspot
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- Critical flaws in ImageMagick library expose websites to hacking
- Ads mislead over broadband Internet access pricing, regulator warns
- Immigration Minister Peter Dutton becomes Creepy internet meme
- Sharepoint is going mobile this year with a new app
- IBM's quantum processor comes out of hiding
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
- CCContract Analyst/Programmer II (Drupal 7.39/PHP) 160427/CAP/vccAsia
- FTTechnical LeadNSW
- CCBusiness Analyst - ICT SecurityNSW
- FTTechnical Business Analyst - BINSW
- CCFront end and Full Stack DevelopersNSW
- FTTechnical Writer - Sydney BasedNSW
- FTSystem EngineerACT
- FTSenior DBA / Team LeadVIC
- CCIT Program Delivery Office Lead- Government BackgroundNSW
- FTProduct Owner - MarketingNSW
- FTSharePoint DeveloperSA
- CCMid Range Developer (Senior .NET Developer)QLD
- CCNV1 | System admin with SQL server experience for Defence Application SupportACT
- CCIT Solution Architect - ApplicationsNSW
- FTDigital Account Manager - Online MediaNSW
- CCAnalyst Programmer (JAVA/Windows Programming) 160422/AP/544Asia
- CCPortfolio Manager - Customer Service SystemVIC
- CCMS Biz Talk ConsultantNSW
- FTSenior Application SpecialistACT
- FTSharepoint DeveloperACT
- FTApplication Team Lead | Billing & CreditVIC
- FTAGILE Training Manager/CoachNSW
- CCEnterprise Architect (Security)NSW
- FTSenior Change Manager - Capital MarketsNSW
- CCAccount Manager - Software Solutions - Global IT CompanyNSW