Article | 22/05/2013 Twitter aims to become safer with two-step sign-inTwitter, in a much-needed move to keep its users safer from cyberattacks, is introducing a more secure login process.
Article | 20/05/2013 Yahoo Japan says 22 million user IDs may have been stolenYahoo Japan, the country's largest Web portal, said up to 22 million user IDs may have been leaked during a hack that was discovered last week.
Article | 10/05/2013 Payment card processors hacked in $45 million fraudA vast debit card fraud scheme that allegedly netted $US45 million has been linked to the hacking of credit card processors in the US and India.
Article | 10/05/2013 The Onion explains how its Twitter account was hackedHackers who commandeered The Onion's Twitter account used simple but effective phishing attacks to obtain passwords, according to a writeup by the pub...
Article | 9/05/2013 Name.com forces customers to reset passwords following security breachDomain registrar Name.com forced its customers to reset their account passwords on Wednesday following a security breach on the company's servers that...
Article | 3/05/2013 Systems manager arrested for hacking former employer's networkA 41-year-old man was arrested for allegedly disrupting his former employer's network after he was passed over for promotions, leading him to quit his...
Article | 2/05/2013 Dutch bill seeks to give law enforcement hacking powersThe Dutch government today presented a draft bill that aims to give law enforcement the power to hack into computer systems -- including those located...
Article | 2/05/2013 Goverment mulls data breach notification law, but details are secretAustralia's government is keeping a tight hold on proposed data breach notification legislation that could become law before a federal election in Sep...
Article | 26/04/2013 LivingSocial gets hacked, 50 million users told to reset passwordsMore than 50 million users of the daily deals site LivingSocial are being asked to reset their passwords after hackers attacked the company's servers ...
Article | 24/04/2013 Amazon looks to move security appliances to the cloud, says CISOAmazon Web Services (AWS) is looking to expand its security offerings with hosted intrusion protection appliances and more extensive encryption featur...
Article | 24/04/2013 FireEye finds Gh0stRAT cyberespionage campaigns continueA well-known cyber-spying tool called Gh0st RAT is still being employed in stealthy malware attacks, according to a new report from security firm Fire...
Article | 24/04/2013 AP Twitter hack prompts fresh look at cybersecurity needsGetting hacked on Twitter is fast becoming a rite of passage for big corporations, but Tuesday's attack on the Associated Press could be a tipping poi...
Article | 23/04/2013 One in five data breaches are the result of cyberespionage, Verizon saysEven though the majority of data breaches continue to be the result of financially motivated cybercriminal attacks, cyberespionage activities are also...
Article | 22/04/2013 Germans fine Google for gathering personal data with Street View carsGoogle must pay a €145,000 (US$190,000) fine in Germany for gathering and storing emails, photos, passwords and chat protocols from unprotected Wi-Fi ...
Best Deals on PCWorld
- NotebooksView all »
- TabletsView all »
- Mobile PhonesView all »
- Printers & ScannersView all »
- Networking, Wireless & VoIPView all »
Sign up to PC World Today for the latest news, reviews and galleries from PC World Australia.Sign up now »
- FTTechnical Consulting ManagerNSW
- FTSenior Python DeveloperNSW
- FTQuality ManagerSA
- FTTest EngineerVIC
- FTOS Web Applications DeveloperNSW
- FTFlash / ActionScript Developer - ContractNSW
- FTR&D EngineerSA
- FTWeb Analyst - WebTrendsVIC
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTTechnical Business AnalystNSW
- FTLead Software EngineerSA