A contentious piece of U.S. law giving the National Security Agency broad authority to spy on people overseas expires at the end of the year.
Intel Security has released a tool that allows users to check if their computer's low-level system firmware has been modified and contains unauthorized code.
Two years ago, at the Cisco Live! Conference in Melbourne, as a result of the Snowden Revelations, Cisco revealed that it was going to the extraordinary lengths of shipping its routers to vacant addresses in order to stop government security agents installing backdoor access to the networks they’d be used on – which in Cisco’s case, means everything from corporate and government networks to the backbone of the internet.
More than 130 Android apps containing some malicious coding managed to infiltrate the Google Play store, possibly because the developers’ tools that built them were tainted, according to security researchers.
Google is asking developers to take over its effort to make end-to-end email encryption more user friendly, raising questions over whether it’ll ever become an official feature in the company’s products.
The cybersecurity industry has been talking up artificial intelligence and machine learning as a way to stop the hackers, but don’t necessarily believe all the hype.
A hacker forced thousands of publicly exposed printers to spew out rogue messages in order to warn their owners about the risks of printer hacking.
A ‘white hat’ is an ethical computer hacker or cyber security expert. White hat hackers often conduct exploratory testing to ensure an organization or computer system is properly protected.
Privacy groups in the U.S. and seven European countries will ask consumer protection agencies to investigate the maker of two internet-connected toys for violations of laws designed to protect children's privacy.
Facebook, Twitter, Microsoft and YouTube have agreed to share with one another identifying digital information of violent terror content that they find on their platforms.
Here’s a quick way to do it, without spending a lot of money on expensive software.
If a President Obama-backed commission has its way, consumers will one day see cybersecurity ratings on technology products in the same way nutritional labels are found on packaged foods.
Latest News Articles
- The NSA's foreign surveillance: 5 things to know
- After CIA leak, Intel Security releases detection tool for EFI rootkits
- Cisco on CIA WikiLeaks revelations: It’s not our problem… this time
- Old Windows malware may have tampered with 132 Android apps
- Google shifts on email encryption tool, leaving its fate unclear
Most Popular Articles
- 1 10 powerful, obscure Windows keyboard shortcuts you should know
- 2 Hisense displays successors to amazing Series 7 ULED - Series 8 and 9
- 3 LG 2017 OLED and Super LED UHD 4K TVs: Hands-on review
- 4 Dell's wild 8K monitor goes on sale with a just-as-stunning price tag
- 5 Intel Optane Memory has a mission: Make hard drives faster than SSDs
Join the PC World New Zealand newsletter!
- Old foes call a truce as Google and Microsoft reach patent agreement
- BlackBerry unveils first security-focused Android smartphone
- Lumia 640: Nothing budget about Microsoft’s latest handset
- Intel Core i3 vs i5 vs i7: find out which cpu is better
- Laser vs. inkjet printers: which is better?