Attackers have started using the Citadel Trojan program to steal master passwords for password management applications and other authentication programs.
"Where's Andrea?" That was the question on the lips of attendees at this week's No Such Con security conference.
A cyberespionage group has been using advanced spear-phishing techniques to steal email log-in credentials from the employees of military agencies, embassies, defense contractors and international media outlets that use Office 365's Outlook Web App.
Facebook and Yahoo have developed a mechanism to prevent the owners of recycled email addresses from hijacking accounts that were registered on other sites using those addresses in the past.
Many companies set up subdomains for use with external services, but then forget to disable them when they stop using those services, creating a loophole for attackers to exploit.
Google is letting users protect their accounts against password compromises by adding support for two-factor authentication based on physical USB keys.
Hackers claim to have stolen a database of almost 7 million Dropbox log-in credentials, but the company says its service was not hacked and that unrelated websites are the data source.
Many security experts feel that passwords are no longer sufficient to keep online accounts safe from hackers, but we're still a long way from widespread adoption of biometrics and alternative methods of authentication.
Hackers could have had an inside track on unpatched flaws in major software projects because of a critical vulnerability in Bugzilla, a system that many developers use to track and discuss bugs in their code.
Virtual private network servers based on OpenVPN might be vulnerable to remote code execution attacks through Shellshock and other recent flaws that affect the Bash Unix shell.
Apple's iOS 8 addresses a serious weakness that could allow attackers to hijack the wireless network authentication of Apple devices and gain access to enterprise networks.
Salesforce.com users are being targeted by a new version of a computer Trojan that has typically attacked online banking customers until now.
The hackers behind the Kelihos botnet are trying to capitalize on users' increased awareness about the security of Apple online accounts through a new phishing campaign.
Professional networking site LinkedIn is rolling out new features that allow users to easily manage authenticated sessions across multiple devices and better understand what caused security-related changes on their accounts.
Future versions of the Firefox OS mobile platform will allow users to control application-specific permissions, a feature with both privacy and security benefits that's missing on Android.
Most Popular Reviews
- 1 LG G6 Plus: Full, in-depth review
- 2 First Look: Nikon D850
- 3 OnePlus 5: Full, in-depth review
- 4 Nokia 8: Full, in-depth review
- 5 Sony's latest Ultra HD OLED debuts in Australia
Join the newsletter!
- Radeon RX Vega won't get 3-way or 4-way multi-GPU support in games
- Easy Fixes for Six Common Laptop Problems
- Intel kills its standalone Project Alloy VR headset, as PC-powered VR wins out
- AMD Radeon phases out the CrossFire brand as multi-GPU gets more complicated
- Radeon RX Vega graphics cards get 2-way multi-GPU support in Radeon Software 17.9.2
PCW Evaluation Team
The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.
The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.
The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic
I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.
It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.
The HP OfficeJet 250 Mobile Printer is a great device that fits perfectly into my fast paced and mobile lifestyle. My first impression of the printer itself was how incredibly compact and sleek the device was.
- Huawei Y5 (2017) Review
- First Look: The Evil Within 2
- LG G6 Plus: Full, in-depth review
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- FTSocial Media Executive / Specialist (Facebook) - Online PokerNSW
- CCSenior Project ManagerNSW
- FTSecurity ConsultantOther
- FTChange Manager OR Senior Change AnalystOther
- CCProgram / Project AnalystVIC
- FTProject ManagerNSW
- CCMigration EngineerNSW
- CCMultiple Hadoop Developers SydneyNSW
- CCSharepoint DeveloperWA
- FTMulesoft Integration DeveloperOther
- FTTest Analyst (Automation)ACT
- TPSenior Change ManagerNSW
- CCSenior Network DesignerVIC
- FTChange and Business Deployment Specialist - $800 per dayOther
- FTBig Data EngineerOther
- FTe-Learning Instructional DesignerOther
- CCBusiness Analyst - Financial and Billing systemsVIC
- CCNetwork Planner - TelcoVIC
- CCTechnical Specialist - Software Asset ManagementVIC
- FTBilling Consultant - TelecommunicationsOther
- FTTechnical writerNSW
- TPChange ManagerVIC
- TPWordPress DeveloperVIC
- FTSenior Project Manager - BI/DWOther