Italian surveillance software maker Hacking Team recently claimed that it hasn't lost any customers after the massive leak of its internal data two weeks ago. But it has lost at least one business partner: U.S.-based penetration testing specialist an...
Surveillance software maker Hacking Team has provided its government customers with the ability to infect the low-level firmware found in laptops and other computers that they wanted to spy on.
The group behind the Duqu cyberespionage tool has compromised at least two telecommunications operators and one electronic equipment manufacturer, in addition to a cybersecurity firm and venues that hosted high-level nuclear negotiations between worl...
Multiple cyberespionage groups are specifically targeting government and military organizations from countries in Asia and the Pacific region with the goal of gathering geo-political intelligence, according to new security research.
A security firm is warning that a group of Russian hackers known for targeting military, government and media organizations is now preparing to attack banks in the US and elsewhere.
A team of developers has created a rootkit for Linux systems that uses the processing power and memory of graphics cards instead of CPUs in order to remain hidden.
The group of attackers behind cyberintrusions at the White House and the Department of State last year used malware that bears strong similarities to cyberespionage tools suspected to be of Russian origin.
Even though its activities were exposed last year, a cyberespionage group dubbed Pawn Storm has ramped up its efforts over the past few months, targeting NATO members and potentially the White House.
Based on data collected by Google, less than one percent of Android devices had a potentially harmful application installed last year. This includes devices on which users have installed applications from outside the official Google Play store.
A new malware program is being used to do reconnaissance for targeted attacks against companies in the energy sector.
For the past two years, a cyberespionage group that likely operates from Lebanon has hacked into hundreds of defense contractors, telecommunications operators, media groups and educational organizations from at least 10 countries.
As security researchers continue to analyze malware used by a sophisticated espionage group dubbed the Equation, more clues surface that point to the U.S. National Security Agency being behind it.
If you patched your Windows computers in 2010 against the LNK exploit used by Stuxnet and thought you were safe, researchers from Hewlett-Packard have some bad news for you: Microsoft's fix was flawed.
A collection of computer Trojans that have been used since 2009 to steal data from government agencies, military contractors, media organizations and other companies is tied to cyberespionage malware possibly created by French intelligence agencies.
European law enforcement agencies seized command-and-control servers used by Ramnit, a malware program that steals online banking credentials, FTP passwords, session cookies and personal files from victims.
Most Popular Reviews
- 1 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
- 2 Sony Xperia XZ review: turbo-charged last-gen phone
- 3 Hisense Series 7 ULED 4K UHD TV review
- 4 Sony X9300D and X8500D UHD 4K TV review
- 5 Moto X Force review: Leading features from a mid-range phone
Join the PC World newsletter!
Latest News Articles
- Malware from Mirai DDoS attack continues to harass in short bursts
- To solve IoT security, look at the big picture, ARM says
- FCC tells ISPs to get customer permission before sharing sensitive info
- No need to shoot down drones! Many of them can now be hijacked
- Qualcomm agrees to buy NXP for over US$37 billion
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
- Google Pixel XL full, in-depth smartphone review: The new best Android phone
- Japan Robot, gadget and car expo slideshow
- Panasonic DX900U UHD 4K smart TV review: Best all-round TV ever?
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- CCContract Programmer (.Net/SQL) 161027/P/vhaAsia
- FTIntermediate Front End DeveloperQLD
- FTTechnical Business AnalystNSW
- FTMicrosoft Dynamics AX Technical ArchitectACT
- FTSOE ConsultantACT
- CCSenior Business AnalystVIC
- FTMicrosoft Dynamics AX Manufacturing ConsultantSA
- CCAccounts Payable/Contract Officer- NSW Government backgroundNSW
- CCDigital Project ManagerNSW
- CCDatacenter EngineerNSW
- CCProgress DeveloperQLD
- FTERP Support ConsultantQLD
- FTSenior Java ProgrammerWA
- FTSolution Architect - Application/IntegrationVIC
- CCAX Functional SupportQLD
- TPRelease and Deployment MangerACT
- CCContract Analyst Programmer (JAVA/J2EE/MySQL) 161103/AP/581Asia
- FTEnterprise Database Manager - Defence - Permanent - Sydney CBDNSW
- FTLevel 1- 2 Helpdesk SupportVIC
- CCSiebel Technical Integration SpecialistACT
- CCSr. Solutions Architect- Agile, (Transformation or Relocation )NSW
- FTMicrosoft Dynamics AX Finance ConsultantVIC
- CCProject SchedulerACT
- CCApplication Performance Test Lead/ArchitectQLD
- FTInstructional Designer - eLearningSA