From televisions to passenger planes, even the most unassuming device can, if accessed by the wrong people, be turned into something more sinister.
hacking in pictures
From online bank heists to Chinese hackers, 2013 is adding up to be a security mess
Whether it is on the phone, online or in person, here are ten lies hackers, phishers and social engineers will tell you to get what they want
These "White Hat" security researchers are ethical hackers whose discoveries and inventions shake things up — as they try to stay one step ahead of their underground "Black Hat" cousins…
Online security experts vpnMentor have investigated the accessibility of Amazon Echo by hacking into one unsuspecting family’s device, highlighting how easily it could be tampered with.
WikiLeaks has released more than 8,700 documents it says come from the CIA's Center for Cyber Intelligence, with the documents saying the agency had 24 "weaponized" zero-day exploits for the Android operating system as of 2016.
More than 100 members of the Israel Defense Forces, the majority of them stationed around the Gaza strip, fell victim to a cyberespionage attack that used malicious Android applications to steal information from their mobile devices.
Two senators have written to the U.S. Department of Defense about reports that President Donald Trump may still be using an old unsecured Android phone, including to communicate through his Twitter account.
A security researcher is showing that it’s not hard to hold industrial control systems for ransom. He's experimented with a simulated water treatment system based on actual programmable logic controllers (PLCs) and documented how these can be hacked.
A ‘white hat’ is an ethical computer hacker or cyber security expert. White hat hackers often conduct exploratory testing to ensure an organization or computer system is properly protected.
Every time there's an election, the topic of hacking one comes to the surface. During a presidential election, that conversation gets louder. Yet, even the elections held every two years see some sort of vote hacking coverage. But can you really hack...
Here’s how to find out if your child is involved in malicious online activity -- before the authorities do
"Hunting is not a sport. In a sport, both sides should know they're in the game." - According to Field and Stream magazine, this is an oft quoted hunting expression. I couldn’t resist the irony of applying this quote to the cyber security industry wh...
Netflix is securing the borders of its US library, but the latest crackdown is another token effort in a war it can never win.
Whitepapers about hacking
Having an identity and access management solution is a must. Businesses cannot operate without them. However, this paper asks - are you sure the user credentials are being used by the correct individual? · Most organizations work hard to ensure compliance with corporate security policy but that doesn’t necessarily mean they’re protected · Managing identities is essential—but it can also lead to a false sense of security · Do the credentials and the behaviour make business sense? If you can’t interpret activity in the context of identity, you may be at risk
Videos about hacking
Most Popular Reviews
- 1 Huawei P30 Pro review: A photography powerhouse that leans into and elevates its natural strengths
- 2 Samsung Galaxy S10 review: Messy decisions mar smart evolutions
- 3 Nokia 8.1 review: The more things change, the more they stay the same
- 4 Huawei Watch GT review: Battery life isn't everything
- 5 Oppo AX7 review: New looks, same old budget buy
Join the newsletter!
- The latest Windows patch is breaking even more PCs with antivirus installed
- Acer CEO Jason Chen explains why his PCs are going niche
- Cooler Master SK630 review: Low-profile gaming keyboards are officially a trend
- I Spent A Night With One Of LGs Newest 4K OLED TVs And I Did Nothing But Play Sekiro On It
- Samsung's Galaxy Foldgate only proves that Apple is right to wait for a foldable iPhone
PCW Evaluation Team
As the Maserati or BMW of laptops, it would fit perfectly in the hands of a professional needing firepower under the hood, sophistication and class on the surface, and gaming prowess (sports mode if you will) in between.
The MSI PS63 is an amazing laptop and I would definitely consider buying one in the future.
This small mobile printer is exactly what I need for invoicing and other jobs such as sending fellow tradesman details or step-by-step instructions that I can easily print off from my phone or the Web.
Microsoft Office continues to make a student’s life that little bit easier by offering reliable, easy to use, time-saving functionality, while continuing to develop new features that further enhance what is already a formidable collection of applications
I’d recommend a Dell XPS 15 2-in-1 and the new Windows 10 to anyone who needs to get serious work done (before you kick back on your couch with your favourite Netflix show.)
It’s useful for office tasks as well as pragmatic labelling of equipment and storage – just don’t get too excited and label everything in sight!
- Huawei P30 Pro: Full, in-depth review
- Panasonic Lumix S1 review
- Want to play Apex Legends?
- Everything you need to know about Smart TVs
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?