Article | 24/05/2013 Researchers find unusual malware targeting Tibetan users in cyberespionage operationSecurity researchers from antivirus vendor ESET discovered a piece of cyberespionage malware targeting Tibetan activists that uses unusual techniques ...
Article | 23/05/2013 Researchers find more versions of digitally signed Mac OS X spywareSecurity researchers have identified multiple samples of the recently discovered "KitM" spyware for Mac OS X, including one dating back to December 20...
Article | 22/05/2013 New Citadel malware variant targets Payza online payment platformA new variant of the Citadel financial malware is targeting users of the Payza online payment platform by launching local in-browser attacks to steal ...
Article | 20/05/2013 Attack on Telenor was part of large cyberespionage operation with Indian origins: reportA recent intrusion on the computer network of Norwegian telecommunications company Telenor was the result of a large cyberespionage operation of India...
Article | 17/05/2013 New Mac spyware found on Angolan activist's computerPreviously unknown Mac OS X spyware, signed with a valid Apple Developer ID, has turned up on the laptop of an activist from Angola at a human rights ...
Article | 17/05/2013 In a sea of malware, viruses make a small comebackThe computer virus seems to be making a subtle comeback.
Article | 16/05/2013 Pushdo botnet is evolving, becomes more resilient to takedown attemptsSecurity researchers from Damballa have found a new variant of the Pushdo malware that's better at hiding its malicious network traffic and is more re...
Article | 15/05/2013 Researchers uncover large cyberfraud operation targeting Australian bank customersSecurity researchers from Russian cybercrime investigations firm Group-IB have uncovered a cyberfraud operation that uses specialized financial malwar...
Article | 14/05/2013 Android threats growing in number and complexity, report saysThe Android threat landscape is growing in both size and complexity with cybercriminals adopting new distribution methods and building Android-focused...
Article | 14/05/2013 It's better to call ahead before sending malware, Symantec findsHackers are finding it pays to call ahead before sending malware-laden email.
Article | 7/05/2013 AutoIt scripting increasingly used by malware developersAutoIt, a scripting language for automating Windows interface interactions, is increasingly being used by malware developers thanks to its flexibility...
Article | 3/05/2013 Accused SpyEye creator extradited to the USAn Algerian man accused of helping to develop and distribute the SpyEye computer virus has been extradited from Thailand to the U.S. to face criminal ...
Article | 24/04/2013 Recently patched Java flaw already targeted in mass attacks, researchers sayA recently patched Java remote code execution vulnerability is already being exploited by cybercriminals in mass attacks to infect computers with scar...
Article | 24/04/2013 FireEye finds Gh0stRAT cyberespionage campaigns continueA well-known cyber-spying tool called Gh0st RAT is still being employed in stealthy malware attacks, according to a new report from security firm Fire...
Best Deals on PCWorld
- NotebooksView all »
- TabletsView all »
- Mobile PhonesView all »
- Printers & ScannersView all »
- Networking, Wireless & VoIPView all »
Sign up to PC World Today for the latest news, reviews and galleries from PC World Australia.Sign up now »
- FTR&D EngineerSA
- FTSenior Python DeveloperNSW
- FTQuality ManagerSA
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTTest EngineerVIC
- FTWeb Analyst - WebTrendsVIC
- FTFlash / ActionScript Developer - ContractNSW
- FTLead Software EngineerSA
- FTOS Web Applications DeveloperNSW
- FTTechnical Business AnalystNSW
- FT.NET - Sitecore Developer - Melbourne - PermNSW