A persistent, widespread malware campaign that utilizes compromised Apache servers is locking users' computers and demanding a fee of US$300 to free their data.
We believe Apple will introduce the iPad 5 at a separate event in October, just like last year, and push the release date of the iPad 5, as well as the sequel to last year's iPad Mini, to late October 2013.
A vulnerability that has existed in Android for the past four years can allow hackers to modify any legitimate and digitally signed application in order to transform it into a Trojan program that can be used to steal data or take control of the OS.
A simple piece of malicious software is circulating that steals Litecoins, a virtual currency based on the Bitcoin system.
Game maker Ubisoft said on Tuesday an account database was breached due to unauthorized access of one of its websites, revealing users' personal information.
A large coalition of civil rights and privacy groups and potentially thousands of websites will stage protests on the Fourth of July to protest surveillance programs at the U.S. National Security Agency.
A 30-year-old Bulgarian was extradited to the U.S. from Paraguay in order to face charges related to his alleged involvement in Shadowcrew, a large cybercrime forum that was dismantled by U.S. authorities in 2004.
From online bank heists to Chinese hackers, 2013 is adding up to be a security mess
A U.S. man prosecuted for exposing a weakness in how AT&T handled the personal data of its iPad users filed an appeal on Monday of his conviction and 41-month sentence.
Applications for asylum or asylum assistance were submitted on behalf of former U.S. National Security Agency contractor Edward Snowden to a number of countries including China, Russia, and India, whistle-blower site WikiLeaks said Tuesday.
It's been a busy six months for security chills and spills, so here's our semi-annual update on the "biggest security snafus so far" this year.
Some websites and mobile app developers are confused about how to comply with revised rules governing the online collection of personal information from children that took effect in the U.S. Monday, critics said.
A critical vulnerability that could allow remote attackers to access sensitive enterprise log-in credentials and other data was fixed last week in Crowd, a single sign-on (SSO) and identity management tool used by large organizations to simplify acce...
Is anything secure anymore? The National Security Agency (NSA) leaks have produced a number of side effects. What we assumed was a safe form of communications is perhaps not so secure after all. The gold standard of secure mobile messaging, BlackBerr...
ZRTPCPP, an open-source library that's used by several applications offering end-to-end encrypted phone calls, contained three vulnerabilities that could have enabled arbitrary code execution and denial-of-service attacks, according to researchers fr...
Gadgets & Things
Most Popular Reviews
- 1 Finally! LG OLED TV 2016 range review
- 2 Huawei Nova Plus smartphone review
- 3 Apple iPhone 7 Plus review: including Portrait Mode
- 4 Google Daydream View VR full, in-depth review
- 5 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
Join the PC World newsletter!
Latest News Articles
- Intel thinks IoT will have a firm place in the stores of the future
- China tightens control over app stores
- A new Microsoft foldable device patent offers more grist for the Surface phone rumor mill
- Critical flaw lets hackers take control of Samsung SmartCam cameras
- Facebook launches fake news reporting tool in Germany
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
- The top 10 best and worst tech gadgets and products of 2016
- TV of the year award 2016
- Best phone of the year 2016
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- FTBrand Marketing Manager - Premium Entertainment BrandNSW
- TPNetwork Security OfficerVIC
- FTTrading Systems EngineerNSW
- CCIT Support AnalystVIC
- TPSystem AdministratorQLD
- FTConsulting Solution/Integration ArchitectVIC
- CCProject/ Operational CoordinatorNSW
- FTInfrastructure Solution ArchitectSA
- CCWebMethod DeveloperSA
- FTSolutions Architect - Data Centre/ NetworkACT
- CCSoftware DeveloperACT
- CCMicrosoft Devops Engineers - contract - SydneyNSW
- TPLevel 3 Systems EngineerWA
- FTJunior-Mid Level Implementation CoordinatorQLD
- TPTest AnalystQLD
- FTChange ManagerACT
- FTManager Integration PlanningNSW
- TPTest ManagerQLD
- FTSenior Java EngineerACT
- FTFunctional ConsultantNSW
- FTITCM EngineerNSW
- CCSenior Business AnalystSA
- CCAnalyst Programmer (Contract) FinanceNSW
- FTBusiness Development Manager - Queensland TerritoryQLD
- FTLevel 3 EngineerNSW