Italian surveillance software maker Hacking Team recently claimed that it hasn't lost any customers after the massive leak of its internal data two weeks ago. But it has lost at least one business partner: U.S.-based penetration testing specialist an...
Surveillance software maker Hacking Team has provided its government customers with the ability to infect the low-level firmware found in laptops and other computers that they wanted to spy on.
The group behind the Duqu cyberespionage tool has compromised at least two telecommunications operators and one electronic equipment manufacturer, in addition to a cybersecurity firm and venues that hosted high-level nuclear negotiations between worl...
Multiple cyberespionage groups are specifically targeting government and military organizations from countries in Asia and the Pacific region with the goal of gathering geo-political intelligence, according to new security research.
A security firm is warning that a group of Russian hackers known for targeting military, government and media organizations is now preparing to attack banks in the US and elsewhere.
A team of developers has created a rootkit for Linux systems that uses the processing power and memory of graphics cards instead of CPUs in order to remain hidden.
The group of attackers behind cyberintrusions at the White House and the Department of State last year used malware that bears strong similarities to cyberespionage tools suspected to be of Russian origin.
Even though its activities were exposed last year, a cyberespionage group dubbed Pawn Storm has ramped up its efforts over the past few months, targeting NATO members and potentially the White House.
Based on data collected by Google, less than one percent of Android devices had a potentially harmful application installed last year. This includes devices on which users have installed applications from outside the official Google Play store.
A new malware program is being used to do reconnaissance for targeted attacks against companies in the energy sector.
For the past two years, a cyberespionage group that likely operates from Lebanon has hacked into hundreds of defense contractors, telecommunications operators, media groups and educational organizations from at least 10 countries.
As security researchers continue to analyze malware used by a sophisticated espionage group dubbed the Equation, more clues surface that point to the U.S. National Security Agency being behind it.
If you patched your Windows computers in 2010 against the LNK exploit used by Stuxnet and thought you were safe, researchers from Hewlett-Packard have some bad news for you: Microsoft's fix was flawed.
A collection of computer Trojans that have been used since 2009 to steal data from government agencies, military contractors, media organizations and other companies is tied to cyberespionage malware possibly created by French intelligence agencies.
European law enforcement agencies seized command-and-control servers used by Ramnit, a malware program that steals online banking credentials, FTP passwords, session cookies and personal files from victims.
Most Popular Reviews
- 1 Huawei P9 review: lifting photography to another level... sometimes.
- 2 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 3 D-Link Taipan AC3200 Ultra tri-band modem-router review
- 4 Dell XPS 13 (2016) review: Making the very best Ultrabook
- 5 Microsoft Surface Book review: The verdict on Microsoft's first notebook
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- Review: Wireless charging and waterproof cases for iPhone plus Ollclip (Movie) Studio case
- Google tool lets users personalize the ads they see
- Review: Incipio OtterBox and 3Sixt covers for the Samsung Galaxy S7 and S7 Edge
- All coverage from Computex 2016
- Huawei beats Samsung and all Android rivals on security patching
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
- CCContract Programmer (JAVA/SQL) 160621/P/866Asia
- FTIT Service Desk AnalystNSW
- CCWeb Developer (Drupal)SA
- CCContract Analyst Programmer (JAVA/J2EE/SQL) 160616/AP/185Asia
- CCProject ManagerNSW
- CCLevel 1 & 2 Helpdesk (Need SAP, ERP system experience)NSW
- CCOracle iLearning Business AnalystNSW
- FTPractice Lead - InsuranceNSW
- CCContract Analyst Programmer (J2EE/JAVA/SQL) 160621/AP/082Asia
- CCMaster Scheduler - IT Infrastructure ProgramsNSW
- FTSystems application support analystNSW
- CCSenior Performance & Automation EngineerNSW
- CCService Desk ConsultantVIC
- CCSolution ArchitectNSW
- FTTechnical Lead - Tier 1 Customer interfaceACT
- CCData Warehouse Specialist- Power BI, SSAS DBA, Azure, SQLNSW
- FTFront End .Net Developer (.Net / Angular / Bootstrap)NSW
- FTSenior Software Developer (Full Stack)SA
- CCUX DesignersQLD
- CCRelease & Configuration Manager | Defence intelligence application | NV1 clearedACT
- CCETL Developer - Tableau FocusNSW
- CCSharepoint Developer | Air Force project | NV1 clearanceNSW
- CCContract Junior Programmer (JAVA / SQL) 160621/JP/224Asia
- FTIT Support Analyst (Renewal Contract)Asia
- FTSenior Architect, TechnologyNSW