A ‘white hat’ is an ethical computer hacker or cyber security expert. White hat hackers often conduct exploratory testing to ensure an organization or computer system is properly protected.
Privacy groups in the U.S. and seven European countries will ask consumer protection agencies to investigate the maker of two internet-connected toys for violations of laws designed to protect children's privacy.
Facebook, Twitter, Microsoft and YouTube have agreed to share with one another identifying digital information of violent terror content that they find on their platforms.
Here’s a quick way to do it, without spending a lot of money on expensive software.
If a President Obama-backed commission has its way, consumers will one day see cybersecurity ratings on technology products in the same way nutritional labels are found on packaged foods.
San Francisco’s Muni transit system was reportedly hit by ransomware since Friday, leading to the message “You Hacked, ALL Data Encrypted” being displayed on the computer screens at stations, according to newspaper reports.
Plans are afoot to build the U.K.'s first National College of Cyber Security at Bletchley Park, the birthplace of the country's wartime codebreaking efforts.
There is a simple way to show a Wi-Fi password in Windows 10—just head over to Wireless Properties.
A vulnerability in a multimedia framework present on some versions of Ubuntu can be exploited by sound files meant to be played on the venerable Nintendo Entertainment System, according to security researcher Chris Evans.
Eugene Kaspersky says Microsoft's favoritism towards Windows Defender is unfair.
Now you can get LastPass on your computer and your phone without paying $12 per year.
While many of the recent breaches like LinkedIn and Twitter have focused on the impact on consumers, rather than businesses, it doesn’t mean that companies can’t be the target, whether large or small. The reality: any data is valuable on the black market, and hackers are just itching to get their hands on yours. As a CEO, owner, or IT Manager at a company, you have a lot more at stake than just one consumer – so are you doing everything you can to protect the company from an attack?
Latest News Articles
- Privacy groups urge investigation of 'internet of toys'
- Facebook, Twitter, Microsoft and YouTube will share terror content info
- How to password protect a PDF before sending it by email
- Obama's cybersecurity plan faces uncertainty with Trump
- San Francisco’s Muni transit system reportedly hit by ransomware
Most Popular Articles
- 1 Android device updates: the Galaxy S7 and S7 Edge are finally getting Nougat
- 2 Sensitive access tokens and keys found in hundreds of Android apps
- 3 Here's how much Tesla will require EV owners to pay to charge up
- 4 PCWorld's January Digital Edition: How AMD's Ryzen chip could change everything
- 5 AI should enhance, not replace, humans, say CEOs of IBM and Microsoft
Join the PC World New Zealand newsletter!
- Old foes call a truce as Google and Microsoft reach patent agreement
- BlackBerry unveils first security-focused Android smartphone
- Lumia 640: Nothing budget about Microsoft’s latest handset
- Intel Core i3 vs i5 vs i7: find out which cpu is better
- Laser vs. inkjet printers: which is better?