• News
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Tech
    • Software
    • Wi-Fi & Networks
    • Windows
  • Best Picks
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Tech
    • Software
    • Wi-Fi & Networks
    • Windows
  • Reviews
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Tech
    • Software
    • Wi-Fi & Networks
    • Windows
  • How-To
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Tech
    • Software
    • Wi-Fi & Networks
    • Windows
  • Deals
  • Laptops
  • Windows
  • Security
  • More
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Mobile
    • PCs & Components
    • Smart Tech
    • Software
    • Wi-Fi & Networks
  • Newsletters
  • Digital Magazine – Subscribe
  • Digital Magazine – Info
  • Smart Answers
Skip to content
  • Menu
  • News
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Tech
    • Software
    • Wi-Fi & Networks
    • Windows
  • Best Picks
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Tech
    • Software
    • Wi-Fi & Networks
    • Windows
  • Reviews
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Tech
    • Software
    • Wi-Fi & Networks
    • Windows
  • How-To
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Tech
    • Software
    • Wi-Fi & Networks
    • Windows
  • Deals
  • Laptops
  • Windows
  • Security
  • More
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Mobile
    • PCs & Components
    • Smart Tech
    • Software
    • Wi-Fi & Networks
  • Newsletters
  • Digital Magazine – Subscribe
  • Digital Magazine – Info
  • Smart Answers
  • Hot Topics
  • Back to School
  • Best laptops
  • Best VPN
  • Best antivirus
  • Best SSDs
  • Best monitors
  • Laptop deals
  • Desktop PC deals

Latest Security News

SEE SECURITY STORIES BY CATEGORY

  • Security
  • Security News
  • Security Best Picks
  • Security Reviews
  • Security How-To
More
    News

    Google will review web apps that want access to its users’ data

    In response to recent attacks where hackers abused Google's OAuth services to gain access to Gmail accounts, the company will review new web applications that request Google users' data.
    By Lucian Constantin 7 years ago
    HP rolls out patch to stop keylogging bug in some laptops
    News

    HP rolls out patch to stop keylogging bug in some laptops

    Consumers with HP laptops that have been accidentally recording their keystrokes can easily address the problem with a patch from the PC maker.
    By Michael Kan 7 years ago
    News

    A ‘kill switch’ is slowing the spread of WannaCry ransomware

    Friday’s unprecedented ransomware attack may have stopped spreading to new machines — at least briefly — thanks to a "kill switch" that a security researcher has activated.
    By Michael Kan 7 years ago
    News

    A ransomware attack is spreading worldwide, using alleged NSA exploit

    A ransomware strain appears to be spreading worldwide, by leveraging a hacking tool that may have come from the U.S. National Security Agency.
    By Michael Kan 7 years ago
    News

    The nasty new Jaff ransomware demands $3,700 payments

    Attackers behind the highly successful Locky and Bart ransomware campaigns have returned with a new creation: A malicious file-encrypting program called Jaff that asks victims for payments of around $3,700
    By Lucian Constantin 7 years ago
    Password managers: The good, the bad, and the ugly
    Security Measures

    Password managers: The good, the bad, and the ugly

    Besides antivirus protection, a password manager is the most important security tool you can use—if you know what to look for and what to avoid.
    By Violet Blue 7 years ago
    Certain HP laptops are found recording users’ keystrokes
    News

    Certain HP laptops are found recording users’ keystrokes

    Over two dozen HP laptop models may have secretly been recording users’ keystrokes by mistake, according to a Swiss security firm.
    By Michael Kan 7 years ago
    News

    Trump pushes US government to the cloud with cybersecurity order

    President Trump has finally signed a long-awaited executive order on cybersecurity, which calls for the U.S. government to move to the cloud and modernize its IT infrastructure.
    By Michael Kan 7 years ago
    News

    Latest firmware updates for Asus routers fix CSRF security flaws

    Users of Asus RT-N and RT-AC series routers should install the latest firmware updates released for their models because they address vulnerabilities that could allow attackers to hijack router settings.
    By Lucian Constantin 7 years ago
    News

    Some HP PCs are recording your keystrokes

    Security company Modzero found a program acting as a keylogger in certain HP PCs.
    By Ian Paul 7 years ago
    Intel concerned about name of John McAfee’s privacy phone
    News

    Intel concerned about name of John McAfee’s privacy phone

    Intel has told a court that MGT Capital Investments has gone ahead with the announcement of the “John McAfee Privacy Phone,” even though the company that proposes to change its name to “John McAfee Global Technologies” has previously said that it did not plan to launch products and services under the McAfee mark.
    By John Ribeiro 7 years ago
    News

    Microsoft finally bans SHA-1 certificates in Internet Explorer and Edge

    The Tuesday updates for Internet Explorer and Microsoft Edge forces those browsers to flag SSL/TLS certificates signed with the ageing SHA-1 hashing function as insecure.
    By Lucian Constantin 7 years ago
    News

    Bot-generated comments swamp FCC, urging overturn of net neutrality

    An apparent bot-generated campaign has posted more than 83,400 comments on the U.S. Federal Communications Commission's website supporting the agency chairman's plan to gut net neutrality rules.
    By Grant Gross 7 years ago
    How to protect your Google and Facebook accounts with a security key
    News

    How to protect your Google and Facebook accounts with a security key

    Security keys offer a more secure alternative to code-based two-factor authentication.
    By Martyn Williams 7 years ago
    New IoT malware targets 100,000 IP cameras via known flaw
    News

    New IoT malware targets 100,000 IP cameras via known flaw

    Over 100,000 internet-connected cameras may be falling prey to a new IoT malware that’s spreading through recently disclosed vulnerabilities in the products.
    By Michael Kan 7 years ago
    News

    Microsoft fixes 55 vulnerabilities, 3 exploited by Russian cyberspies

    Microsoft released security patches Tuesday for 55 vulnerabilities across the company's products, including three flaws that have already been exploited in targeted attacks by cyberespionage groups.
    By Lucian Constantin 7 years ago
    News

    Emergency Microsoft patch fixes ‘crazy bad’ Windows malware scanner bug

    Microsoft released an update for the malware scanning engine bundled with most of its Windows security products to fix a highly critical vulnerability that could allow attackers to hack computers.
    By Lucian Constantin 7 years ago
    How to check for the Intel Active Management exploit that lets hackers take over your PC
    News

    How to check for the Intel Active Management exploit that lets hackers take over your PC

    Although most consumers PCs are safe from Intel's Active Management vulnerability, some may actually have the hardware that's vulnerable. Here's how to check.
    By Gordon Mah Ung 7 years ago
    News

    German firms will streamline online login with a European bent

    Several German firms are taking a stab at a single login process for accessing different online services — an approach that could compete with U.S. offerings.
    By Michael Kan 7 years ago
    News

    FCC hit with DDoS attacks after John Oliver takes on net neutrality

    The FCC's website slowed to a crawl after comic and political commentator John Oliver urged viewers to flood the agency with comments in support of net neutrality, in what appeared to be a repeat of a 2014 incident. But the cause may have been more sinister than people expressing their support for net neutrality rules.
    By Grant Gross 7 years ago
    News

    How to prevent your data from being searched at the U.S. border

    Travelers concerned about their privacy can take steps to protect their data as they cross the U.S. border. They should remember the old Boy Scout motto: Be prepared.
    By Grant Gross 7 years ago
    News

    US device searches at borders ignite resistance

    U.S. Customs is on pace to search nearly 30,000 devices for the year. If you're traveling outside the country, here's what you need to know.
    By Grant Gross 7 years ago
    Trojan malware infests official HandBrake for Mac downloads
    News

    Trojan malware infests official HandBrake for Mac downloads

    Hackers compromised a download server for HandBrake, a popular open-source program for converting video files, and used it to distribute a macOS version of the application that contained malware.
    By Lucian Constantin 7 years ago
    News

    Email dump hits French candidate Macron ahead of election

    Another political campaign has been hit by an email dump. This time, the target is French presidential candidate Emmanuel Macron.
    By Michael Kan 7 years ago
    Patch to fix Intel-based PCs with enterprise bug rolls out next week
    News

    Patch to fix Intel-based PCs with enterprise bug rolls out next week

    Starting next week, PC makers will roll out a patch that fixes a severe vulnerability found in certain Intel-based business systems making them easier to hack.
    By Michael Kan 7 years ago
    News

    Cyberspies tap free tools to make powerful malware framework

    Over the past year, a group of attackers has managed to infect hundreds of computers belonging to government agencies with a malware framework stitched together from JavaScript code and publicly available tools.
    By Lucian Constantin 7 years ago
    News

    Google Docs phishing attack underscores OAuth security risks

    Google has stopped Wednesday’s clever email phishing scheme, but the attack may very well make a comeback.
    By Michael Kan 7 years ago
    The pitfalls of cybersecurity shopping: hype and shoddy products
    News

    The pitfalls of cybersecurity shopping: hype and shoddy products

    Today's cybersecurity market is beset by vaporware, exaggerated marketing claims and shady sales tactics, security managers say.
    By Michael Kan 7 years ago
    News

    Top tips for finding the right cybersecurity products

    Having trouble finding the right security products for your business? You’re not the only one. We asked experienced buyers for their tips.
    By Michael Kan 7 years ago
    Snake cyberespionage malware is ready to bite Mac users
    News

    Snake cyberespionage malware is ready to bite Mac users

    A sophisticated Russian cyberespionage group is readying attacks against Mac users and has recently ported its Windows backdoor program to macOS.
    By Lucian Constantin 7 years ago
    BlackBerry KeyOne hands-on: A physical keyboard makes Android more productive
    News

    BlackBerry KeyOne hands-on: A physical keyboard makes Android more productive

    For the first time the iconic BlackBerry hardware keyboard has been married with Android in the BlackBerry KeyOne.
    By Martyn Williams 7 years ago
    Mac malware: Coming soon to a computer near you
    Security Measures

    Mac malware: Coming soon to a computer near you

    The facts dispute the myth that Macs are immune to malware, and adware is the number one culprit.
    By Violet Blue 7 years ago
    News

    India’s Supreme Court hears challenge to biometric authentication system

    Two lawsuits being heard this week before India’s Supreme Court question a requirement imposed by the government that individuals should quote a biometrics-based authentication number when filing their tax returns.
    By John Ribeiro 7 years ago
    Here’s how the sneaky Gmail phishing attack fooled victims with a fake Google Docs app
    News

    Here’s how the sneaky Gmail phishing attack fooled victims with a fake Google Docs app

    Google Docs was pulled into a sneaky email phishing attack on Tuesday that was designed to trick users into giving up access to their Gmail accounts.
    By Michael Kan 7 years ago
    News

    Shodan search engine starts unmasking malware command-and-control servers

    There's now a new tool that could allow researchers and companies to quickly block communications between some malware families and their constantly changing command-and-control servers.
    By Lucian Constantin 7 years ago
    Android gets patches for critical flaws in media handling, hardware drivers
    News

    Android gets patches for critical flaws in media handling, hardware drivers

    Android has received security fixes for over one hundred vulnerabilities, including 29 critical flaws in the media processing server, hardware-specific drivers and other components.
    By Lucian Constantin 7 years ago
    News

    Vulnerability hits Intel enterprise PCs going back 10 years

    Intel is reporting a firmware vulnerability that could let attackers take over remote management functions on computers built over the past decade.
    By Michael Kan 7 years ago
    News

    Trump seeks to upgrade US government IT services

    President Trump is launching a special council to upgrade the U.S. government’s IT services. “Americans deserve better digital services from their government,” the executive order, released on Monday, said.
    By Michael Kan 7 years ago
    NSA suggests using virtualization to secure smartphones
    News

    NSA suggests using virtualization to secure smartphones

    The U.S. National Security Agency is now suggesting government departments and businesses should buy smartphones secured using virtualization, a technology it currently requires only on tablets and laptops
    By Peter Sayer 7 years ago
    Meet Windows Defender Security Center, your PC’s safety belt in the Creators Update
    News

    Meet Windows Defender Security Center, your PC’s safety belt in the Creators Update

    Microsoft's Windows Defender antivirus has a new job, heading up Windows Defender Security Center and uniting all the OS safety features in one convenient location.
    By Ian Paul 7 years ago
    News

    NSA ends surveillance tactic that pulled in citizens’ emails, texts

    The U.S. National Security Agency will no longer sift through emails, texts and other internet communications from U.S. citizens that mention foreign targets under surveillance.
    By Michael Kan 7 years ago
    News

    Google’s Chrome will soon start warning you more about HTTP pages

    A Google effort to push websites to implement encryption is expanding. Starting in October, the company will flag even more HTTP connections as insecure in its Chrome browser.
    By Michael Kan 7 years ago
    Stealthy Mac malware spies on encrypted browser traffic
    News

    Stealthy Mac malware spies on encrypted browser traffic

    A new malware program that targets macOS users is capable of spying on encrypted browser traffic and stealing sensitive information.
    By Lucian Constantin 7 years ago
    News

    Network management vulnerability exposes home cable modems to hacking

    Hundreds of thousands of internet gateway devices from around the world, primarily cable modems, are vulnerable to hacking because of a serious weakness in their implementation of the Simple Network Management Protocol.
    By Lucian Constantin 7 years ago
    News

    Cloudflare launches service to secure IoT devices from external hacks

    Web optimization and security firm Cloudflare launched a service that could allow IoT manufacturers to protect devices from attacks and deploy patches much quicker.
    By Lucian Constantin 7 years ago
    BlackBerry’s keyboard-equipped KeyOne Android phone will launch in May
    News

    BlackBerry’s keyboard-equipped KeyOne Android phone will launch in May

    The BlackBerry KeyOne, an Android-based smartphone with a hardware keyboard, will be available in the U.S. and Canada from May 31, the phone's maker said Thursday.
    By Martyn Williams 7 years ago
    News

    The average ransomware payment has skyrocketed to over $1,000

    The hackers spreading ransomware are getting greedier. In 2016, the average fee to free computers hit with the notorious infection rose to $1077, about five times higher than in 2016, Symantec found.
    By Michael Kan 7 years ago
    News

    Russian hackers use OAuth, fake Google apps to phish users

    The Russian hacking group blamed for targeting U.S. and European elections has been tricking victims into handing over login credentials with fake Google security applications.
    By Michael Kan 7 years ago
    News

    Old Windows Server machines can still fend off hacks. Here’s how

    Keeping a computer up-to-date, with the latest OS and software patch, is one of the best things you can do to stay safe from cyber threats.
    By Michael Kan 7 years ago
    News

    Webroot deletes Windows files and causes serious problems for users

    Users of Webroot's endpoint security product, consumers and businesses alike, had a nasty surprise Monday when the program started detecting Windows files as malicious.
    By Lucian Constantin 7 years ago
    Previous 1 … 7 8 9 10 11 12 13 14 15 … 190 Next
    PCWorld helps you navigate the PC ecosystem to find the products you want and the advice you need to get the job done.
    • Policies
      • Privacy Policy
      • Cookie Policy
      • Copyright Notice
      • European Privacy Settings
      • Member Preferences
      • Editorial independence
      • Licensing & Eprints
      • California: Do not Sell my Personal Info
    • About
      • About Us
      • Advertise
      • Ad Choice
      • Contact Us
      • Foundry Careers
      • GamePro
      • Smart Answers
    • PCWorld Categories
      • Business

        Laptop

        Mobile

        PC Hardware

        Deals

    • Subscribe
      • Recent cover images of Macworld Digital Magazine
      • Digital Magazine - Subscribe

        Digital Magazine - Info

        Gift Subscription

        Newsletters

    Copyright © 2024 IDG Communications, Inc.
    Top Of Page