Users that run unpatched software beware. Hackers have been relying on an old software bug connected to the Stuxnet worm to carry out their attacks.
Ransomware is one of the fastest-growing and most lucrative forms of cybercrime in the world. It's malware that encrypts files on your device and is often delivered through an innocent-seeming link in an email or when a “helpful” program is downloaded.
Is a vigilante hacker trying to secure your IoT device from malware? The mysterious developer behind a growing computer worm wants people to think so.
Much more than a me-too product, the Deco M5 delivers both innovation and performance.
More than 8.4 billion internet connected devices are estimated to be available in 2017, and Gartner estimates that number will reach 20.4 billion by 2020. In 2017, the consumer sector represents 63 percent of all devices in use, or 5.2 billion units.
The suspected CIA spying tools that WikiLeaks has dumped have been linked to hacking attempts on at least 40 targets in 16 countries, according to security firm Symantec.
A group of hackers who claimed to hold millions of iCloud accounts for ransom said on Friday they'd been paid. But one bitcoin expert says that's bogus.
When the source code to suspected Russian-made malware leaked online in 2013, guess who used it? A new release from WikiLeaks claims the CIA borrowed some of the code to bolster its own hacking operations.
The U.S. might add other airports to its ban restricting passengers from bringing laptops on board certain flights from the Middle East.
Companies that choose to outsource their IT operations should be careful. Suspected Chinese hackers have been hitting businesses by breaching their third-party IT service providers.
Apple fixed a serious vulnerability that could allow attackers to remotely execute malicious code on the Broadcom Wi-Fi chips used in iPhones, iPads, and iPods.
A researcher has uncovered some 40 serious vulnerabilities in Samsung's code that could be remotely exploited by hackers.
The chip maker has divested its majority holdings in McAfee to investment firm TPG for US$3.1 billion. McAfee will now again become a standalone security company, but Intel will retain a minority 49 percent stake.
Security researchers have uncovered the Android version of an iOS spyware known as Pegasus in a case that shows how targeted electronic surveillance can be.
A team of researchers from security vendor Cylance demonstrated a proof-of-concept ransomware program that ran inside a motherboard's Unified Extensible Firmware Interface (UEFI).
Work / Life balance, Windows 10 allows you to get the best of both worlds.
Most Popular Reviews
- 1 Subaru XV 2017 review
- 2 Samsung 2017 QLED Q7 TV: Full, in-depth review
- 3 Kogan Atlas UltraSlim Pro laptop: full, in-depth review
- 4 Gigabyte Aorus GA-AX370-Gaming 5 AMD Ryzen AM4 motherboard review
- 5 Kogan curved 4K UHD 55-inch LED LCD TV review
Join the Good Gear Guide newsletter!
Latest News Articles
- Hackers use old Stuxnet-related bug to carry out attacks
- A vigilante hacker may have built a computer worm to protect the IoT
- Suspected CIA spying tools linked to hacks in 16 countries
- The iCloud hackers' bitcoin ransom looks like a fake
- WikiLeaks: CIA used bits of Carberp Trojan code for malware deployment
PCW Evaluation Team
- Samsung Galaxy S8 phone: full, in-depth review
- Ryzen 5 vs Intel Core i5 CPU Australian review
- Mass Effect Andromeda review: One for the fans
- Which flagship TV is best? Sony 4K HDR Bravia 2016 versus LG 4K HDR OLED 2016
- 10 Blu-ray movies / Best looking Blu-ray movies
- CCPMO Analyst - Telco - MelbourneVIC
- FTSystem AnalystSA
- CCSenior Business AnalystNSW
- FTIT Service Owner - Supply Chain TechnologiesNSW
- TPSolution ArchitectQLD
- FTTester AnalystACT
- TPChange ManagerNSW
- CCTest Analyst - Infrastructure - NV1 ClearanceACT
- TPEnterprise ArchitectQLD
- CCSolution Architect - Audio Visual/Video DomainVIC
- FTChief Architect - Public SectorACT
- FTHealth Electronic Claiming Systems BA - Permanent - North Ryde areaNSW
- FTSenior Business Analyst - Health experience requiredNSW
- CCCRM Techno FunctionalistQLD
- CCSenior Policy OfficerNSW
- FTBusiness Analyst/Project ManagerQLD
- CCSAP CRM Functional AnalystQLD
- CCProject Communications and Engagement SpecialistQLD
- FTDeveloper / Junior Solution DesignerQLD
- CCTest Capability LeadNSW
- CCDigital Solution ArchitectNSW
- TPBI AnalystQLD
- TPLinux System AdministratorQLD
- FTChange ManagerNSW
- FTNetwork Consulting ArchitectVIC