As cybercriminals employ increasingly sophisticated tactics to steal identities and data, and the costs and consequences of data breaches skyrocket, here are seven steps that your small business should be taking to insulate themselves from cyberattacks.
malware in pictures
Musicians dominate the 2014 list of celebs you might not want to search on for fear of malware
The earliest worms and viruses were created for geeky fun and did little harm - oh, how times have changed. Here are 20 worms, viruses and botnets that show the evolution of malware, from Creeper to Flame.
On 26 June, Kaspersky Lab held its 10th annual Virus Analysts Summit in Dubrovnik, Croatia. At the event the company's chief security researchers discussed the latest online threats to target businesses and consumers.
At least two Australian companies hit following global ransomware outbreak, with Cadbury factory in Hobart one of the local businesses impacted.
A new Android malware has managed to steal access to more than 1 million Google accounts, and it continues to infect new devices, according to security firm Checkpoint.
A new open-source tool called MBRFilter can protect the master boot record of Windows computers from modification by ransomware and other malicious attacks.
Yes, even bad-guy malware developers have to keep their "customers" happy. Read what happens when F-Secure tests the "help desks" of four crypto-locking malware makers.
A newly discovered fake Pokemon Go game will actually lock your phone and then secretly run in the background, clicking on porn ads.
Has a malware infection taken your PC hostage? Here's how to clean it out and restore your PC to a pristine state.
Flash drives are virus magnets. This is a generally accepted truth, but today I learned it firsthand.
Tami asked the Antivirus & Security Software forum why friends are receiving spam that appears to come from her.
SUPERAntiSpyware found three Trojans on a reader's PC. He asked the <a href="http://forums.pcworld.com/index.php?/forum/2000-windows/">Windows</a> forum how this could happen when his PC is protected.
You wouldn't let your kids walk the streets of Amsterdam's Red Light District, but giving them unrestricted access to the Web is practically the same thing. The problem is, how do you block out all that inappropriate Web content?
Advanced Persistent Threats (APTs) are the plague of enterprise security, crippling businesses and IT careers through costly data breaches and massive losses. Their goal is to steal intellectual property, and confidential company information. They ro...
Many people will know what it’s like to regularly click ‘close’ on the nagging Windows 10 ‘upgrade’ notification. It’s been happening every day for many months. But apparently something on one of these hundreds of fade-into-the-background notificatio...
PDF files are one of the most common, and most trusted document formats out there. However, that trust, combined with the cross-platform use of PDFs makes the Adobe file format one of the most targeted and exploited by malicious attacks as well.
Perhaps you've heard that the Apple Mac OS X operating system is simply more secure by design and not prone to the security flaws and vulnerabilities that plague the dominant Microsoft Windows operating system? Well, don't believe the hype. Apple unl...
Rootkits, a type of stealth technology used by malware malefactors, attempt to hide in the dark corners of an infected PC and evade detection. A new post out today from the Microsoft Malware Protection Center shines the spotlight on the evil tools.
Whitepapers about malware
This whitepaper discusses the results from the 2014 Cost of Data Breach Study: Australia. In this year’s report, the fifth of its kind, the total average cost paid by a company in a breach increased to $2.8 million, while assessing the likelihood of a company having data breaches in the next 24 months.
Why virtualise your NAS environment?
Most Popular Reviews
- 1 Oppo A73 review: The budget smartphone that sets the bar for 2018
- 2 Oppo R11s review: The iClone you know and love, but not quite the one you deserve
- 3 Blackberry KEYone Black Edition review: What the original KEYone should have been
- 4 Zolo Liberty+ review: The true wireless earbuds you've been waiting for
- 5 Samsung Gear IconX 2018 review: The path of least resistance makes for an easy upgrade
Join the newsletter!
- Surviving Mars review: Spreading humanity to the stars isn't easy
- Microsoft tries forcing Mail users to open links in Edge, and people are freaking out
- This week in games: Shadow of the Tomb Raider confirmed, Witcher 3's Geralt joins Soulcalibur VI
- Record your travels for cheap with this $30 dash cam
- In Pictures: Netgear launch the Nighthawk XR500 gaming router
PCW Evaluation Team
The printer was convenient, produced clear and vibrant images and was very easy to use
I would recommend this device for families and small businesses who want one safe place to store all their important digital content and a way to easily share it with friends, family, business partners, or customers.
It’s easy to set up, it’s compact and quiet when printing and to top if off, the print quality is excellent. This is hands down the best printer I’ve used for printing labels.
Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.
The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.
The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.
- Hands On: Pitting the Apple HomePod against the Sonos One
- Everything You Can Do, I Can Do Better: Comparing The Google Home’s Assistant To Amazon Echo’s Alexa
- Samsung Galaxy S9+ review: A predictably-exellent flagship uplifted by a standout camera
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
Product Launch Showcase
- FTSenior Front End Developer (Urgent)Other
- FTTechnical Lead- Angular4/.NetNSW
- FTSenior Front-End DeveloperOther
- FTSenior AWS Cloud SpecialistsOther
- FTBig Data Analyst/Business AnalystNSW
- FTSolution ArchitectOther
- FTVMWare LeadOther
- FTSenior Network EngineerACT
- TPBusiness Analyst - Health PASQLD
- FTBusiness AnalystOther
- CCWindows System EngineerNSW
- FTAnalyst Programmer C++, UNIX & SQL - Financial Services - Permanent - SydneyNSW
- FTSystems Support and Implementation OfficerQLD
- CCImplementation EngineerWA
- CCSAP ArchiectNSW
- CCSystems EngineerWA
- CCSolution ArchitectWA
- FTSenior Transition Project ManagerOther
- FTChange ManagerOther
- CCXamarin DeveloperNSW
- CCReporting Data Analyst - TelcoVIC
- CCOracle E-Business Suite DeveloperQLD
- FTOracle Database Engineer - EXADATAOther
- CCBusiness Analyst - RFTVIC
- CCSAP DevelopersNSW