Article | 4/11/2009 Microsoft re-patches last month's critical IE updateMicrosoft yesterday re-patched Internet Explorer, the third time it's been forced to repair one of the updates from its largest-ever bug fix, which wa...
Article | 4/11/2009 Microsoft correctly predicts reliable exploits just 27% of the timeMicrosoft's monthly predictions about whether hackers will create reliable exploit code for its bugs were right only about a quarter of the time in th...
Article | 4/11/2009 Software shields online banking on infected PCsA U.K. security company is giving to banks, for free, security software that it says can block malicious software from manipulating online banking tra...
Article | 4/11/2009 M86 Security buys FinjanLooking to strengthen its Web security product offerings, M86 Security has acquired most of the assets of Finjan, a seller of Web gateway security app...
Article | 3/11/2009 ArcSight adds unstructured log analysis with Logger 4Event management vendor ArcSight will soon start selling a new version of its product, designed to mine unstructured computer logfiles for signs of ha...
Article | 31/10/2009 Q&A: Don't judge Microsoft security by the number of Patch Tuesday bulletinsMicrosoft Corp. pours more money into software security than any other major vendor both because it has to and because it can. Yet for all the investm...
Article | 2/11/2009 Microsoft patch tally: 6 years, 745 vulnerabilitiesWith its massive security update last month, Microsoft Corp. marked the end of the sixth year since it moved to a monthly patch schedule. An informal ...
Article | 3/11/2009 Better security for not quite everyoneIt's scary to think how much sensitive or even valuable information can be gleaned from an untended PC, even one whose user just walked away for a few...
Article | 29/10/2009 Amazon downplays report highlighting vulnerabilities in its cloud serviceAmazon said today that it has taken steps to mitigate a security issue in its cloud computing infrastructure that was identified recently by researche...
Article | 31/10/2009 After one year, Conficker infects 7 million computersThe Conficker worm has passed a dubious milestone. It has now infected more than 7 million [m] computers, security experts estimate.
Article | 28/10/2009 Internet phone systems become the fraudster's toolCybercriminals have found a new launching pad for their scams: the phone systems of small and medium-sized businesses across the U.S.
Article | 16/10/2009 Sneaky Microsoft plug-in puts Firefox users at riskAn add-on that Microsoft silently slipped into Mozilla's Firefox last February leaves that browser open to attack, Microsoft's security engineers ackn...
Article | 20/10/2009 How hackers find your weak spotsWhile there are an infinite number of social engineering exploits, typical ones include the following:
Article | 20/10/2009 Hijacked Web sites attack visitorsHere's the scenario: Attackers compromise a major brand's Web site. But instead of stealing customer records, the attacker installs malware that infec...
Best Deals on PCWorld
- Mobile PhonesView all »
- NotebooksView all »
- TabletsView all »
- Printers & ScannersView all »
- Networking, Wireless & VoIPView all »
Sign up to PC World Today for the latest news, reviews and galleries from PC World Australia.Sign up now »
- FTTechnical Business AnalystNSW
- FTR&D EngineerSA
- FTWeb Analyst - WebTrendsVIC
- FTSenior Python DeveloperNSW
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTOS Web Applications DeveloperNSW
- FTFlash / ActionScript Developer - ContractNSW
- FTQuality ManagerSA
- FTTest EngineerVIC
- FTLead Software EngineerSA