An improved attack on the firmware in Apple computers makes them vulnerable to hard-to-detect malware without even being connected to a network, according to a Black Hat conference presentation due to be given later this week.
In late 2008, a worm called Conficker began infecting millions of computers, startling the computer security community into action.
Yahoo said Monday it had removed malware from its advertising network, after malicious code there had gone undetected for at least six days.
The U.S. government should deputize private companies to strike back against cyberattackers as a way to discourage widespread threats against the nation's businesses, a former government official says.
Robot hitchiker attacked, abandoned... Nokia sells Here mapping business to German car makers... Spy-spotting software comes to Wall St... and more tech news
Attackers have started exploiting a flaw in the most widely used software for the DNS (Domain Name System), which translates domain names into IP addresses.
Some Apple mobile users have been encountering a pop-up message that is particularly difficult to close.
An individual who did work for Hacking Team was in contact with hackers working for a terrorist organization, and disgruntled employees -- who deny the charge -- were planning to sell an antidote to the spyware vendor's surveillance software, an Ital...
The U.S. Federal Trade Commission should reject a privacy group's push to extend the E.U.'s controversial right to be forgotten rules to the U.S. because such regulations would have a "sweeping" negative effect on many U.S. companies, a trade group s...
A hacker extracted customer log-in credentials from a server owned by Bitdefender that hosted the cloud-based management dashboards for its small and medium-size business clients.
Researchers have developed a new technique that could allow attackers to determine with a high degree of accuracy which Tor websites users are accessing and where those websites are hosted.
Google won't comply with an order from France's privacy watchdog group to apply the right to be forgotten to all its search results around the world.
Attackers could exploit a new vulnerability in BIND, the most popular Domain Name System (DNS) server software, to disrupt the Internet for many users.
Opponents of a U.S. Senate bill intended to encourage businesses to share information about cyberthreats may have stalled a vote on the legislation.
Obama wants to boost U.S. supercomputing power...OPM, Anthem hackers also hit United Airlines...Oracle preps 'Sonoma' chip for low-priced Sparc servers...and more tech news.
Most Popular Reviews
- 1 Kogan Agora 4G Pro review: the final word on Kogan's best smartphone
- 2 Sony Xperia Z4 Tablet (LTE) review: The tablet of choice for anyone on Android
- 3 Bose SoundLink Mini II Bluetooth speaker review
- 4 Apple MacBook Air 2015 review: Only better with time
- 5 Lenovo ThinkPad T550 laptop
Join the PC World newsletter!
Deals on PC World
- Networking, Wireless & VoIP
Deals on PC World
Latest News Articles
- Apple computers vulnerable to 'Thunderstrike 2' firmware worm
- Apple falls to third in China smartphone rankings, while Xiaomi vaults ahead
- Cleaning up botnets takes years, if ever, to complete
- Yahoo tackles large 'malvertising' campaign in its ad network
- Plantronics BackBeat Sense Bluetooth headphones
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
- FTField EngineerNSW
- FTDesktop Engineering ManagerNSW
- FTBusiness Development Manager & Account ManagerVIC
- CCMarketing Coordinator - World's largest search engine!NSW
- FTSenior Network EngineerNSW
- CCLead Generator - Software SolutionsNSW
- FTDevOps Consultant - Microsoft Experience - Digital ConsultancyVIC
- CCAccount Strategist | Sales Executive | Global Search EngineNSW