A serious flaw in a component that's used to authenticate clients on Wi-Fi networks could expose Android, Linux, BSD, and possibly Windows and Mac OS X systems to attacks.
Microsoft is working on new features for its Office 365 cloud service designed to give customers more control over their data and more visibility into how it's being accessed.
For CIOs worried about access to shared resources in the cloud and the data center, Centrify has launched an identity-management service that aims to improve protection for IT management accounts
VMware is combining iOS and Android encryption features with its own network virtualization platform to offer more secure access to enterprise applications and resources.
In the latest blow to Internet of Things (IoT) security, an analysis of smart home devices has found flaws that could give attackers access to sensitive data or allow them to control door locks and sensors.
A new open-source tool can periodically scan an area for rogue Wi-Fi access points and can alert network administrators if any are found.
A Chinese Internet administrator blasted Google on Thursday, after the U.S. search giant decided to stop recognizing digital certificates issued by the group following a security lapse.
Salesforce.com has acquired Toopher, the developer of a mobile two-factor authentication app that uses location-awareness.
Over the last few days, a large number of British Airways customers have found that reward points they accumulated for flights, called Avios, have disappeared from their accounts. Others have been locked out of their accounts completely.
Some Internet gateway devices commonly used by hotels and conference centers can easily be compromised by hackers, allowing them to launch a variety of attacks against guests accessing the Wi-Fi networks.
Cisco Systems released firmware updates for several routers and switches that run its IOS and IOS XE software in order to fix flaws in their autonomic networking infrastructure (ANI) feature.
Attackers could have remotely installed malware on systems running a flawed Dell support tool used to detect customers' products.
Flash files that are vulnerable to a serious flaw patched by Adobe Systems over three years ago still exist on many websites, exposing users to potential attacks.
You don't need to be the NSA to tap calls on Cisco's SPA 300 and 500 IP phones: An authentication flaw allows potential attackers to do that by default.
More than 700,000 ADSL routers provided to customers by ISPs around the world contain serious flaws that allow remote hackers to take control of them.
Most Popular Reviews
- 1 Oppo R11s review: The iClone you know and love, but not quite the one you deserve
- 2 Blackberry KEYone Black Edition review: What the original KEYone should have been
- 3 Samsung Gear IconX 2018 review: The path of least resistance makes for an easy upgrade
- 4 TCL X2 review: QLED escapes the premium market
- 5 Xbox One X review: Brave new world
Join the newsletter!
- Confirmed: AMD will loan chips to help with motherboard updates for Ryzen APUs
- Intel says it's been hit with 32 separate lawsuits over Spectre, Meltdown
- VPN Unlimited review: Good speeds, but what's with that map?
- Who should buy a Ryzen APU, and who shouldn't
- Panasonic Releases Impressive LUMIX DC-GX9 Camera For The Enthusiast
PCW Evaluation Team
The printer was convenient, produced clear and vibrant images and was very easy to use
I would recommend this device for families and small businesses who want one safe place to store all their important digital content and a way to easily share it with friends, family, business partners, or customers.
It’s easy to set up, it’s compact and quiet when printing and to top if off, the print quality is excellent. This is hands down the best printer I’ve used for printing labels.
Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.
The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.
The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.
- Sony a7R Mk III review: The strongest case yet for ditching your DSLR
- Monster Hunter World review
- Oppo R11s: Full, in-depth review
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
Product Launch Showcase
- FTAEM/Jave DeveloperNSW
- CCDevOps EngineerVIC
- CCSenior Project Manager - Infrastructure ServicesVIC
- FTMDM ArchitectOther
- CCSenior Solution Architect - Brisbane locationNSW
- FTGraduate Data Scientist/ Data AnalystNSW
- FTPHP DeveloperWA
- CCSAP Fiori + UI5 ArchitectNSW
- CCIncident ManagerNSW
- FTBusiness Analyst - Supply ChainOther
- CCDatabase Migration SupportNSW
- FTApplications Solution ArchitectOther
- CCIT Security Manager - OperationsNSW
- FTDevelopment Expert (EL1)SA
- FTIT Security EngineerOther
- TPProject ManagerQLD
- FTSolution Architect - DigitalVIC
- FTLead Business AnalystOther
- CCMicrosoft CRM Technical ConsultantNSW
- CCPortfolio Coordinator / Administrator - BrisbaneNSW
- FTSQL Database AdministratorWA
- TPBusiness Intelligence (BI) Analyst ProgrammerQLD
- CCContinuous Improvement and Change Specialist (Black Belt) - Contract - Nth SydNSW
- CCSoftware Engineer /.NET Developer - based in PerthWA
- FTSecurity & IAM Technical SpecialistACT