It has been a week since hackers released software that could be used to attack a flaw in Windows Vista and Server 2008, but Microsoft and security companies say that criminals haven't done much with the attack.
Facebook will enhance its social-networking site's privacy features over the next 12 months as a result of a set of recommendations from the Canadian government.
Social networking services like Facebook and Twitter foster a false sense of security and lead users to share information which can be used by cybercriminals and social engineers. The very concept of social networking is based on connecting and shari...
As fireworks boomed on the Fourth of July, thousands of compromised computers attacked U.S. government Web sites. A botnet of more than 200,000 computers, infected with a strain of 2004's MyDoom virus, attempted to deny legitimate access to sites suc...
In June, the world watched as tweets from the streets of Tehran flooded Twitter. Frequent Twitter users--and people who hadn't even heard of the microblogging service--were suddenly and simultaneously witnessing its potential.
McAfee's latest version of its managed security service includes new features that let companies scan their Web sites for vulnerabilities as well as check for compliance with payment-card industry standards for handling financial data.
Microsoft has sued a Hong Kong seller of mobile ringtones, saying the company used phishing techniques to flood Microsoft Live Messenger users with spam messages.
Oracle on Tuesday released its latest quarterly patch update, which includes 10 security fixes for its database and also addresses a range of vulnerabilities across the vendor's applications portfolio.
In 1989, Eugene Kaspersky ran afoul of the Cascade virus while working for the Ministry of Defence in the heart of the Soviet Union. He defeated it with his wits and a pencil.
Open source security is a hot topic in the IT world. Some people believe that open source solutions are a potential playground for mischief-makers and cyber criminals, while others swear they’re safer than proprietary software.
Sometimes, it seems scams are becoming almost as common as social media experts on Twitter. The latest one, unleashed Monday morning and initially noticed by tech blog Mashable, centers on a fake blog hosted at the domain twittersblogs.com. Tweets co...
Forget spam and phishing as you once knew it: the new breed of cyber criminals are shifting their operations to fertile new fields, including mobile phones, online gaming and Web 2.0. These are the chief threats facing consumers today, and it's peril...
An overwhelming majority of Web sites promoted through spam are hosted in China at service providers that many times choose to ignore complaints and allow illegal activity, according to research from the University of Alabama.
A team of journalists investigating the global electronic waste business has unearthed a security problem too. In a Ghana market, they bought a computer hard drive containing sensitive documents belonging to U.S. government contractor Northrop Grumma...
Former Apple Macintosh evangelist Guy Kawasaki posts Twitter messages about a lot of different things, but the message he put up on Tuesday afternoon was really out of character.
Most Popular Reviews
- 1 Hisense takes the fight to home entertainment heavyweights with flagship Series 8 and 9 ULED TVs
- 2 Sony's latest Ultra HD OLED debuts in Australia
- 3 Panasonic Ultra HD OLED TV Review
- 4 D-Link Omna 180 Cam HD DSH-C310 review
- 5 Oppo A77 smartphone: Full in-depth review
Join the newsletter!
- This week in games: Civilization III for free, Halloween modes shower treats and tricks
- Newegg's selling a 35-inch 2560x1080 curved monitor for $449 today
- Harman Kardon Invoke hands-on: Cortana enters the smart speaker market with a boom
- iPhone 8 Plus vs. LG G6: Which has the best camera in a smartphone?
- Logitech G703 review: A mainstream wireless mouse with some exceptional features
PCW Evaluation Team
Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.
The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.
The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.
The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic
I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.
It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.
- Opinon: Life after KRACK
- Jabra Elite Sport (2017) review
- How to download the Windows 10 Fall Creators Update right now
- Which flagship TV is best? Sony 4K HDR Bravia 2016 versus LG 4K HDR OLED 2016
- 10 Blu-ray movies / Best looking Blu-ray movies
- FTSenior Change AnalystOther
- FTSenior Business Analyst - PaymentsOther
- CCLinux Systems AdministratorVIC
- CCBusiness AnalystNSW
- CCJunior Security AnalystNSW
- TPTechnical Business AnalystQLD
- FTDevOps Engineer/ LeadOther
- FTBusiness AnalystACT
- FTSenior Software EngineerNSW
- FTProfessional Services Consultant - UCMOther
- FTTest Analyst / Engineer (Cloud / O365 migration)Other
- FTChange AnalystOther
- FTWorkday TesterVIC
- CCSenior Workbrain Functional Expert - Brisbane BasedNSW
- CCBI AnalystQLD
- FTTechnical Architect/DeveloperOther
- TPJava DeveloperWA
- FTSenior Security ConsultantNSW
- FTNetwork Engineer - Firewalls (Juniper )Other
- FTMid-Level Drupal DeveloperQLD
- FTScrum MasterOther
- FTSenior Java Developer - marketsVIC
- FTEnvironmental Planner / Land Access CoordinationOther
- FTBusiness Project Manager - Retail Store ChainOther