An attack using the SMB file sharing protocol that has been believed to work only within local area networks for over a decade can also be executed over the Internet, two researchers showed at the Black Hat security conference.
A design flaw in the x86 processor architecture dating back almost two decades could allow attackers to install a rootkit in the low-level firmware of computers, a security researcher said Thursday. Such malware could be undetectable by security prod...
Many smart phone manufacturers preload remote support tools on their Android devices in an insecure way, providing a method for hackers to take control of the devices through rogue apps or even SMS messages.
Inherent insecurity in the routing protocol that links networks on the Internet poses a direct threat to the infrastructure that secures communications between users and websites.
File synchronization services, used to accommodate roaming employees inside organizations, can also be a weak point that attackers could exploit to remain undetected inside compromised networks.
Security researchers demonstrated Thursday flaws that can allow hackers to take over mobile point-of-sale (mPOS) devices from different manufacturers by inserting rogue cards into them.
Today's security software is ineffective against an emerging networking technology already in use by Apple for its Siri voice-recognition software, according to research presented at the Black Hat hacking conference this week.
Exploit kits of cybercrime tools fell into a big slump in the first half of this year after Russian authorities nabbed the alleged creator of the popular Blackhole kit, but users aren't necessarily safer.
The Windows 8 Secure Boot mechanism can be bypassed on PCs from certain manufacturers because of oversights in how those vendors implemented the Unified Extensible Firmware Interface (UEFI) specification, according to a team of security researchers.
Attackers are actively targeting Internet-connected industrial control systems (ICS) in an effort to compromise their operation, according to data collected from a global network of honeypot systems that simulate water pumps.
Many door and window sensors, motion detectors and keypads that are part of security systems used in millions of homes and businesses can be bypassed by using relatively simple techniques, according to researchers from security consultancy firm Bisho...
A variety of network-controlled home automation devices lack basic security controls, making it possible for attackers to access their sensitive functions, often from the Internet, according to researchers from security firm Trustwave.
Sensors widely used in the energy industry to monitor industrial processes are vulnerable to attack from 40 miles away using radio transmitters, according to alarming new research.
Software that lets drivers unlock car doors and even start their vehicles using a mobile phone could let car thieves do the very same things, according to computer security researchers at iSec Partners.
The Black Hat Europe conference in Barcelona next week will feature a keynote on cyberwar from Bruce Schneier, and presentations on security flaws in Apple's Mac OS X and SAP's business software.
Most Popular Reviews
- 1 Subaru XV 2017 review
- 2 Samsung 2017 QLED Q7 TV: Full, in-depth review
- 3 Kogan Atlas UltraSlim Pro laptop: full, in-depth review
- 4 Gigabyte Aorus GA-AX370-Gaming 5 AMD Ryzen AM4 motherboard review
- 5 Kogan curved 4K UHD 55-inch LED LCD TV review
Join the Good Gear Guide newsletter!
Latest News Articles
- Acer's Aspire GX comes out of nowhere to be the first prebuilt Ryzen PC from a major vendor
- Acer's Nitro 5 is a laptop that lets casual gamers get reckless
- Newegg has lowered the price of HP's Stream 11 Pro G2 to $180
- Acer's Predator X27 G-Sync HDR monitor is infused with every feature you could ask for
- How to find the Windows 10 Creators Update's hidden desktop themes
PCW Evaluation Team
A smarter way to print for busy small business owners, combining speedy printing with scanning and copying, making it easier to produce high quality documents and images at a touch of a button.
I've had a multifunction printer in the office going on 10 years now. It was a neat bit of kit back in the day -- print, copy, scan, fax -- when printing over WiFi felt a bit like magic. It’s seen better days though and an upgrade’s well overdue. This HP OfficeJet Pro 8730 looks like it ticks all the same boxes: print, copy, scan, and fax. (Really? Does anyone fax anything any more? I guess it's good to know the facility’s there, just in case.) Printing over WiFi is more-or- less standard these days.
As a freelance writer who is always on the go, I like my technology to be both efficient and effective so I can do my job well. The HP OfficeJet Pro 8730 Inkjet Printer ticks all the boxes in terms of form factor, performance and user interface.
I’d happily recommend this touchscreen laptop and Windows 10 as a great way to get serious work done at a desk or on the road.
Ultimately, I think the Windows 10 environment is excellent for me as it caters for so many different uses. The inclusion of the Xbox app is also great for when you need some downtime too!
For me, the Xbox Play Anywhere is a great new feature as it allows you to play your current Xbox games with higher resolutions and better graphics without forking out extra cash for another copy. Although available titles are still scarce, but I’m sure it will grow in time.
- Samsung Galaxy S8 phone: full, in-depth review
- Ryzen 5 vs Intel Core i5 CPU Australian review
- Mass Effect Andromeda review: One for the fans
- Which flagship TV is best? Sony 4K HDR Bravia 2016 versus LG 4K HDR OLED 2016
- 10 Blu-ray movies / Best looking Blu-ray movies
- FTSolution Architect - SecurityVIC
- FTSecurity and Technical Risk ManagerQLD
- FTPHP / WordPress DeveloperQLD
- FTHealthcare Application Integration SupportQLD
- TPOrganisational Change ManagerQLD
- CCProgram CoordinatorVIC
- FTPERMANENT Business AnalystsSA
- FTService Delivery ManagerNSW
- FTSales Lead / Sales Executive - Enterprise IT Healthcare Perm - North RydeNSW
- CCChange AnalystQLD
- TPLinux System AdministratorQLD
- CCSenior System AdministratorQLD
- CCPersonal AssistantNSW
- FTLevel 3 Systems EngineerNSW
- CCSAP CRM Functional AnalystQLD
- CCNetworks Engineer - SecurityVIC
- FTTechnical ConsultantACT
- FTFront-end Developer (UX/UI)NSW
- FTSenior Business Analyst Forecaster - TelecommunicationsNSW
- FTAgile Scrum Master/TrainerNSW
- FTSenior Security SpecialistNSW
- FTTeam Leader Application SupportVIC
- FTIntegration Specialist - TIBCONSW
- FTSenior Project Manager - Infrastructure / LogisticsNSW
- FTSenior Network EngineerACT