Italian surveillance software maker Hacking Team recently claimed that it hasn't lost any customers after the massive leak of its internal data two weeks ago. But it has lost at least one business partner: U.S.-based penetration testing specialist an...
Surveillance software maker Hacking Team has provided its government customers with the ability to infect the low-level firmware found in laptops and other computers that they wanted to spy on.
The group behind the Duqu cyberespionage tool has compromised at least two telecommunications operators and one electronic equipment manufacturer, in addition to a cybersecurity firm and venues that hosted high-level nuclear negotiations between worl...
Multiple cyberespionage groups are specifically targeting government and military organizations from countries in Asia and the Pacific region with the goal of gathering geo-political intelligence, according to new security research.
A security firm is warning that a group of Russian hackers known for targeting military, government and media organizations is now preparing to attack banks in the US and elsewhere.
A team of developers has created a rootkit for Linux systems that uses the processing power and memory of graphics cards instead of CPUs in order to remain hidden.
The group of attackers behind cyberintrusions at the White House and the Department of State last year used malware that bears strong similarities to cyberespionage tools suspected to be of Russian origin.
Even though its activities were exposed last year, a cyberespionage group dubbed Pawn Storm has ramped up its efforts over the past few months, targeting NATO members and potentially the White House.
Based on data collected by Google, less than one percent of Android devices had a potentially harmful application installed last year. This includes devices on which users have installed applications from outside the official Google Play store.
A new malware program is being used to do reconnaissance for targeted attacks against companies in the energy sector.
For the past two years, a cyberespionage group that likely operates from Lebanon has hacked into hundreds of defense contractors, telecommunications operators, media groups and educational organizations from at least 10 countries.
As security researchers continue to analyze malware used by a sophisticated espionage group dubbed the Equation, more clues surface that point to the U.S. National Security Agency being behind it.
If you patched your Windows computers in 2010 against the LNK exploit used by Stuxnet and thought you were safe, researchers from Hewlett-Packard have some bad news for you: Microsoft's fix was flawed.
A collection of computer Trojans that have been used since 2009 to steal data from government agencies, military contractors, media organizations and other companies is tied to cyberespionage malware possibly created by French intelligence agencies.
European law enforcement agencies seized command-and-control servers used by Ramnit, a malware program that steals online banking credentials, FTP passwords, session cookies and personal files from victims.
Gadgets & Things
Most Popular Reviews
- 1 Finally! LG OLED TV 2016 range review
- 2 Google Daydream View VR full, in-depth review
- 3 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
- 4 Apple iPhone 7 Plus review: including Portrait Mode
- 5 MSI GS70 laptop review
Join the PC World newsletter!
Latest News Articles
- Intel, Microsoft going long distance with Cortana on Windows 10 PCs
- Obama orders review of election hacks as Trump doubts Russia's role
- Ransomware attacks against businesses increased threefold in 2016
- Attackers use hacked home routers to hit Russia's 5 largest banks
- US mulls rules for airlines that plan in-flight Wi-Fi voice calls
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
- The top 10 best and worst tech gadgets and products of 2016
- TV of the year award 2016
- Best phone of the year 2016
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- TPSenior Test AnalystQLD
- FTBusiness Analyst - SQLNSW
- FTIdentity Management Team LeaderQLD
- TPOrganisational Change Manager | CommunitiesQLD
- FTSenior Python DeveloperVIC
- TPIT Document Writer And TrainerVIC
- CCChange ManagerNSW
- TPSenior Engineer-UNIXVIC
- CCApplication Specialist (Cerner) - Brisbane BasedNSW
- FTSolutions Architect - Data Centre/ NetworkNSW
- TPNetwork AdministratorWA
- FTDatabase Administration Team LeaderQLD
- TPProjects Planning ManagerQLD
- CCMainframe Developer (with ASP.NET)QLD
- TPBusiness AnalystACT
- FTJava Full Stack DeveloerQLD
- CCSenior Software Engineer / Architect (Network Technologies)NSW
- CCData Surveyor, Data Analyst, Electrical backgroundACT
- CCSSIS DeveloperNSW
- CCSAP Hana and UI5 ConsultantsACT
- FTBusiness Analyst - SQLNSW
- CCPMO CoordinatorNSW
- FTSoftware Sales & BDMNSW
- TPBusiness Change ManagerQLD
- FTSecurity Sales SpecialistVIC