Malwarebytes said it may take three to four weeks to fix flaws in its consumer product found by Google security researcher Tavis Ormandy.
A banking trojan, known for its small size but powerful capabilities, has expanded the number of financial institutions it can collect data from, according to security vendor Avast.
A type of malware called Reveton, which falsely warns users they've broken the law and demands payment of a fine, has been upgraded with powerful password stealing functions, according to Avast.
It's generally accepted that antivirus programs provide a necessary protection layer, but organizations should audit such products before deploying them on their systems because many of them contain serious vulnerabilities, a researcher warned.
Victims of Simplocker, the first file-encrypting ransomware threat for Android devices, can recover files without paying cybercriminals because the malicious program uses a hardcoded encryption key.
Prague-based antivirus company, Avast, said, on Monday, it took its community forum offline after a data breach, but payment information was not compromised.
Fresh statistics from the maker of a widely used free security product show the extent to which users are encountering file-encrypting malware known as ransomware.
Microsoft has toughened its criteria for classifying programs as adware and gave developers three months to conform with the new principles or risk having their programs blocked by the company's security products.
A new piece of information-stealing malware that appeared earlier this year has been rapidly gaining traction during the past few weeks, with hundreds of infection attempts being detected every day by antivirus vendors.
Although the number of malicious browser extensions has significantly increased in the past year many security products fail to offer adequate protection against them, while others are simply not designed to do so, according to a security researcher.
An analysis of a piece of Android spyware targeting a prominent Tibetan political figure suggests it may have been built to figure out the victim's exact location.
Security researchers warn that cybercriminals have started using Java exploits signed with digital certificates to trick users into allowing the malicious code to run inside browsers.
The website for Reporters Without Borders was booby-trapped to deliver malicious software using the latest Java and Internet Explorer vulnerabilities, security vendor Avast said on Tuesday.
(Writer's Comment: Starting today, Bugs and Fixes will be posted biweekly each month for your convenience. You'll still be able to read the Bugs and Fixes column in the monthly print issue of PCWorld.)
If you haven't bought a new version of your antivirus software in a couple of years, now may be a good time to do so. Malware is evolving faster than ever, and the latest generation of antivirus software is better equipped to handle this rapid pace o...
Most Popular Reviews
- 1 2016 Ford Mustang EcoBoost review
- 2 Synology DS216+ Review
- 3 Review: TCL C1 series 4K TV
- 4 Tech21 Evo Xplorer iPhone case review
- 5 LG 55EG960T OLED UHD TV
Join the Good Gear Guide newsletter!
Latest News Articles
- Linksys Max-Stream AC1900+ WiFi Range Extender RE7000 review
- Sony reveals DualShock 4 wireless adapter for PCs
- Exclusive no more: Sony's PlayStation Now is bringing hundreds of PS3 games to PCs
- AMD sweetens its 6- and 8-core FX chips with free Deus Ex: Mankind Divided
- Twitter rolls out night mode in its iOS app
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCJava DeveloperACT
- CCAgile Business AnalystNSW
- FTDefence Network EngineerACT
- FTIT Manager - Infrastructure Strategy and OperationsNSW
- CCSr. SQL Server DBANSW
- CCMurex Developers x 2NSW
- CCContract Programmer (Data/File Backup Technology) 160826/P/283Asia
- CCInfrastructure Designer - AWSNSW
- CCSenior Process Analyst - WealthVIC
- FTOperations ManagerNSW
- CCSenior Project Manager - Contact CentresNSW
- CCInfrastructure Security EngineerNSW
- CCSAP ArchitectSA
- CCMainframe Application ArchitectNSW
- FTDB2 Systems ProgrammerWA
- CCChange Communications ManagerNSW
- CCSenior Android DeveloperVIC
- CCAnalyst Programmer/Snr. Analyst Programmer 20160817/vedAsia
- CCNetwork Engineer - TelecomVIC
- CCContract Programmer (JAVA/HTML/PHP) 160819/P/733Asia
- CCDesktop Support AnalystSA
- CCContract Systems Analyst (Loutus Notes) 160815/SA/102Asia
- CCIBM ODM Expert (Operation Decision Manager)ACT
- FTProject Administrator (Agile)WA