Malwarebytes said it may take three to four weeks to fix flaws in its consumer product found by Google security researcher Tavis Ormandy.
A banking trojan, known for its small size but powerful capabilities, has expanded the number of financial institutions it can collect data from, according to security vendor Avast.
A type of malware called Reveton, which falsely warns users they've broken the law and demands payment of a fine, has been upgraded with powerful password stealing functions, according to Avast.
It's generally accepted that antivirus programs provide a necessary protection layer, but organizations should audit such products before deploying them on their systems because many of them contain serious vulnerabilities, a researcher warned.
Victims of Simplocker, the first file-encrypting ransomware threat for Android devices, can recover files without paying cybercriminals because the malicious program uses a hardcoded encryption key.
Prague-based antivirus company, Avast, said, on Monday, it took its community forum offline after a data breach, but payment information was not compromised.
Fresh statistics from the maker of a widely used free security product show the extent to which users are encountering file-encrypting malware known as ransomware.
Microsoft has toughened its criteria for classifying programs as adware and gave developers three months to conform with the new principles or risk having their programs blocked by the company's security products.
A new piece of information-stealing malware that appeared earlier this year has been rapidly gaining traction during the past few weeks, with hundreds of infection attempts being detected every day by antivirus vendors.
Although the number of malicious browser extensions has significantly increased in the past year many security products fail to offer adequate protection against them, while others are simply not designed to do so, according to a security researcher.
An analysis of a piece of Android spyware targeting a prominent Tibetan political figure suggests it may have been built to figure out the victim's exact location.
Security researchers warn that cybercriminals have started using Java exploits signed with digital certificates to trick users into allowing the malicious code to run inside browsers.
The website for Reporters Without Borders was booby-trapped to deliver malicious software using the latest Java and Internet Explorer vulnerabilities, security vendor Avast said on Tuesday.
(Writer's Comment: Starting today, Bugs and Fixes will be posted biweekly each month for your convenience. You'll still be able to read the Bugs and Fixes column in the monthly print issue of PCWorld.)
If you haven't bought a new version of your antivirus software in a couple of years, now may be a good time to do so. Malware is evolving faster than ever, and the latest generation of antivirus software is better equipped to handle this rapid pace o...
Most Popular Reviews
- 1 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 2 Mazda MX-5 (2016) review: Absolute driving purity
- 3 Sony 75-inch UHD TV (X9400C) review: Sony and Android are a winning duo
- 4 LG 55EG960T OLED UHD TV
- 5 Panasonic Viera UHD TV review: good hardware, fragmented software
Join the Good Gear Guide newsletter!
Best Deals on Good Gear Guide
Latest News Articles
- Microsoft's Azure Stack beta gets new services and DevOps tools
- Amaysim wins with lowest TIO complaints
- Prysm combines displays with SaaS to extend the reach of enterprise collaboration
- Forget Trump and Clinton: IBM's Watson is running for president
- 5G might be your next home broadband service
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTSystems Administrator/Engineer | $60-90K package | Northern BeachesNSW
- FTTeam Lead ITIL- Permanent OpportunityVIC
- CCMVC .Net Developer- Hurstville NSW 2220NSW
- FTProgram ManagerNSW
- CCTechnical Integration Specialist - MicrosoftACT
- FTSenior Business ConsultantNSW
- CCUser Experience Designer - BaselineACT
- CCContract Analyst Programmer (JAVA/Crystal Report) 160115/AP/vhsAsia
- FTProgram Test DirectorNSW
- CCContract System Engineer (Lotus Domin) 160129/SE/vccAsia
- CCSenior Business Analyst, Enterprise Software SolutionNSW
- CCContract System Analyst (Website/PHP development) 160122/SA/vmtAsia
- CCSAP Basis Admin with JavaACT
- CCSAP Primavera Functional ConsultantNSW
- FTNetwork Engineer | NV2 clearance | Defence projects | Immediate interviewACT
- CCBusiness and Financial AnalystACT
- CCCitrix Systems EngineerNSW
- CCIT Service Deliver & Improvement ManagerACT
- CCAutomation QAVIC
- FTSenior Systems/SAN EngineerNSW
- CCSenior Business Analyst - Life InsuranceVIC
- CCProject Manager - Customer Engagement / NPSVIC
- FTBusiness Intelligence AnalystVIC
- CCSenior Project Manager - ComplianceVIC
- CCObjective ECMS Technical ConsultantSA