Security researchers are warning that Web-based applications are increasing the risk of identity theft or losing personal data more than ever before.
Security - Features
IPhone lovers and other smartphone users should take heed: A security researcher showed ways to spy on a BlackBerry user during a presentation Wednesday, including listening to phone conversations, stealing contact lists, reading text messages, takin...
The head of the U.S. Federal Bureau of Investigation has stopped banking online after nearly falling for a phishing attempt.
It has been a week since hackers released software that could be used to attack a flaw in Windows Vista and Server 2008, but Microsoft and security companies say that criminals haven't done much with the attack.
It is my sad news this morning to report the demise of the world's most famous microblog. Twitter, we hardly knew ye.
Facebook will enhance its social-networking site's privacy features over the next 12 months as a result of a set of recommendations from the Canadian government.
Social networking services like Facebook and Twitter foster a false sense of security and lead users to share information which can be used by cybercriminals and social engineers. The very concept of social networking is based on connecting and shari...
Absent-minded people who lose their smart phones have had a win and thieves who steal mobile devices have had another setback, with the Singapore launch of a new mobile phone security product.
As fireworks boomed on the Fourth of July, thousands of compromised computers attacked U.S. government Web sites. A botnet of more than 200,000 computers, infected with a strain of 2004's MyDoom virus, attempted to deny legitimate access to sites suc...
Twitter and Facebook were hit today with denial-of-service attacks that can knock a site offline, but don't steal information or cause permanent damage. The question is, why?
Lime Group Chairman Mark Gorton found himself in the hot seat last week during a hearing on the problem of inadvertent data leaks on peer-to-peer (P2P) networks including his company's, LimeWire. The hearing was held by the House Oversight and Govern...
The iPhone's security flaws were laid bare at the Black Hat Conference in Las Vegas yesterday, and now the smartphone-clutching public has boiled itself into a frenzy. But how serious is this supposed iPhone virus, and what can be done to protect you...
Attackers seeking to do harm or mischief to networks work with an ever expanding arsenal of tools that sometimes seem to be the stuff of spy fiction, but they are all too real.
Unless you've been living in a cave all summer like one of my friends (it's in Finland, he's an artistic genius) you've probably heard the buzz about cloud computing.
A year has passed since security researcher Dan Kaminsky disclosed a serious flaw in the DNS that makes it possible for hackers to launch cache poisoning attacks, where traffic is redirected from a legitimate Web site to a fake one without the Web si...
UE Boom 2 Bluetooth speaker
Lexar® JumpDrive® S57 USB 3.0 flash drive
Everki ContemPRO Roll Top Laptop Backpack
Samsung portable 1TB T3 drive
Smart LED Bulb LB130
Epson WorkForce ET-4550
Linksys AC5400 MU-MIMO Gigabit router
Epson EcoTank Expression ET-2500
Microsoft L5V-00027 Sculpt Ergonomic Keyboard Desktop
Belkin MIXIT Metallic Lightning to USB Cable
Lexar® JumpDrive® S45 USB 3.0 flash drive
Huawei Mate 9
Epson WorkForce DS-360W
Lexar® Portable SSD
Google Daydream VR headset
Logitech G403 Prodigy mouse
Acer Swift 7
3SIXT Ultra HD Sports Action Camera
Lexar® Professional 1800x microSDHC™/microSDXC™ UHS-II cards
Surface Pro 4
Blade 28 backpack by Arc’teryx
Garmin Fenix Chronos smartwatch
Audio-Technica ATH-ANC70 Noise Cancelling Headphones
HP Pavilion x360 13”
Lexar® JumpDrive® C20c USB Type-C flash drive
Dell XPS 13 laptop
HD Pan/Tilt Wi-Fi Camera with Night Vision NC450
Dell Inspiron 5000 series 2-in-1
Most Popular Reviews
- 1 Oppo R9s Plus phone: Full, in-depth review
- 2 Samsung 2017 QLED Q7 TV: Full, in-depth review
- 3 HTC U Ultra phone full, in-depth review
- 4 Gigabyte Aorus GA-AX370-Gaming 5 AMD Ryzen AM4 motherboard review
- 5 Venom Blackbook Zero 14 laptop review
Join the PC World newsletter!
Latest News Articles
- The NSA's foreign surveillance: 5 things to know
- After CIA leak, Intel Security releases detection tool for EFI rootkits
- Cisco on CIA WikiLeaks revelations: It’s not our problem… this time
- Old Windows malware may have tampered with 132 Android apps
- Google shifts on email encryption tool, leaving its fate unclear
PCW Evaluation Team
A smarter way to print for busy small business owners, combining speedy printing with scanning and copying, making it easier to produce high quality documents and images at a touch of a button.
I've had a multifunction printer in the office going on 10 years now. It was a neat bit of kit back in the day -- print, copy, scan, fax -- when printing over WiFi felt a bit like magic. It’s seen better days though and an upgrade’s well overdue. This HP OfficeJet Pro 8730 looks like it ticks all the same boxes: print, copy, scan, and fax. (Really? Does anyone fax anything any more? I guess it's good to know the facility’s there, just in case.) Printing over WiFi is more-or- less standard these days.
As a freelance writer who is always on the go, I like my technology to be both efficient and effective so I can do my job well. The HP OfficeJet Pro 8730 Inkjet Printer ticks all the boxes in terms of form factor, performance and user interface.
I’d happily recommend this touchscreen laptop and Windows 10 as a great way to get serious work done at a desk or on the road.
Ultimately, I think the Windows 10 environment is excellent for me as it caters for so many different uses. The inclusion of the Xbox app is also great for when you need some downtime too!
For me, the Xbox Play Anywhere is a great new feature as it allows you to play your current Xbox games with higher resolutions and better graphics without forking out extra cash for another copy. Although available titles are still scarce, but I’m sure it will grow in time.
- First look at the Formula 1 2017 pit lane in Melbourne, Australia
- LG 2017 OLED and Super LED UHD 4K TVs: Hands-on review
- Oppo R9s Plus phone: Full, in-depth review
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- FTSocial Media ExecutiveNSW
- FTMid-Level Software Engineer x 2 - Adelaide Based (PV, NV2 or NV1 required)NSW
- TPBusiness Change ManagerQLD
- FTTechnical Data Business AnalystNSW
- FTLevel 2 Technical Support OfficerQLD
- FTSystems AdministratorNSW
- FTDrupal Developer - Senior or Mid levelQLD
- CCTechnical Business Analyst - Infrastructure - VirtualizationNSW
- FTFunctional Consultant - CommercialsQLD
- FTSecurity Lead / ConsultantNSW
- FTFront End .Net Developer. Permanent jobACT
- FTArcFM DeveloperNSW
- FTDeployment Manager | ContractVIC
- CCITCM EngineerNSW
- FTSenior Software Engineer x 2 - Adelaide Based (PV, NV2 or NV1 required)VIC
- CCBusiness AnalystQLD
- FTSolutions Architects - 10 roles availableACT
- CCSharePoint Developer - Multiple Roles - 3-6 Mth Contract Initially - SydneyNSW
- FTJunior Software Engineer - Adelaide Based (PV, NV2 or NV1 required)VIC
- CCApplication Support Specialist- Bathurst or Port MacquarieNSW
- FTEmail Production SpecialistNSW
- FTArchitect (Technical)NSW
- FTSolution Architect l MS Exchange, O365NSW
- FTSeeking all Java Developers!QLD
- FTC# (Full Stack) DeveloperNSW