There is yet another reason to be wary of spam email about bank transfers or invoices -- it could be carrying a new, cleverly designed malware program that steals financial information.
Customers of storage and networking equipment manufacturer Buffalo who downloaded certain files from the company's website in Japan last week might have had their computers infected with an online banking Trojan.
The recent effort to disrupt the Gameover Zeus botnet includes plans for Internet service providers to notify victims, but some security researchers think ISPs should play an even bigger role in the future by actively quarantining infected computers ...
Trend Micro is warning of a phishing campaign touting a "Heartbleed removal" tool, a nonsensical product that is actually malicious software.
Like a crowbar, security software tools can be used for good and evil.
Inexpensive equipment can be used to disrupt vessel-tracking systems and important communications between ships and port authorities, according to two security researchers.
Cybercriminals have been developing increasingly sophisticated malware that make use of Windows PowerShell scripts in an attempt to fly under the radar.
A new variant of a malicious program called BitCrypt that encrypts files and asks victims for bitcoin payments is being distributed by a computer Trojan that first pilfers bitcoin wallets.
A vulnerability in Android that was publicly disclosed in mid-March could be exploited by malicious applications to force devices into an endless reboot loop, according to security researchers from Trend Micro.
Malicious software aimed at stealing online banking credentials surged in the third quarter of this year to a level not seen since 2002, according to a new report from Trend Micro.
Cisco Systems released software security updates Wednesday to address denial-of-service and arbitrary command execution vulnerabilities in several products, including a known flaw in the Apache Struts development framework used by some of them.
A new version of the Apache Struts development framework released Friday fixes two problems that had developers worried.
Chinese hackers are using an automated tool to exploit known vulnerabilities in Apache Struts, in order to install backdoors on servers hosting applications developed with the framework.
Attackers are actively targeting Internet-connected industrial control systems (ICS) in an effort to compromise their operation, according to data collected from a global network of honeypot systems that simulate water pumps.
Trend Micro has found two malicious browser extensions that hijack Twitter, Facebook and Google+ accounts.
Most Popular Reviews
- 1 Kogan Agora 4G Pro review: the final word on Kogan's best smartphone
- 2 Sony Xperia Z4 Tablet (LTE) review: The tablet of choice for anyone on Android
- 3 Bose SoundLink Mini II Bluetooth speaker review
- 4 Apple MacBook Air 2015 review: Only better with time
- 5 Lenovo ThinkPad T550 laptop
Join the PC World newsletter!
Deals on PC World
- Networking, Wireless & VoIP
Deals on PC World
Latest News Articles
- Microsoft bests Google in patent case appeal
- Yahoo picks up fashion commerce site Polyvore
- Mt. Gox CEO Karpeles arrested by Japanese police
- Facebook says Flash security woes could hurt its business
- IBM fattens patent portfolio in cloud tech
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
- FTDesktop Engineering ManagerNSW
- CCLead Generator - Software SolutionsNSW
- FTBusiness Development Manager & Account ManagerVIC
- FTTechnical Sales Support Representative - The Worlds largest Search Engine!NSW
- CCAccount Strategist | Sales Executive | Global Search EngineNSW
- FTField EngineerNSW
- FTDevOps Consultant - Microsoft Experience - Digital ConsultancyVIC
- FTSenior Network EngineerNSW
- CCMarketing Coordinator - World's largest search engine!NSW