Big ideas that altered the course of information security
An online underground economy has recently matured into an efficient, global marketplace to trade stolen goods and offer fraud-related services.
Few tears were shed when McColo, a US-based company that allegedly hosted systems for prolific purveyors of spam, malware and child pornography, was suddenly taken offline by its upstream service providers on November 11.
On October 14, the US Federal Trade Commission, with help from the US Federal Bureau of Investigation and New Zealand police, announced that it had shut down a vast international spam network known as HerbalKing.
As a small-business person, you might bemoan the fact you don't have 24/7 IT support like your larger-scale competitors. Don't panic. You can solve many of the most common computer problems yourself. Here are some snafus you can tackle on your own, t...
Frank Boldewin had seen a lot of malicious software in his time, but never anything like Rustock.C.
As more and more spammers are arrested, prosecuted, and sued under state and federal antispam statutes, there's one thing you can count on: Someone somewhere will invariably call the targeted spammer a "spam king."
What Gates, McCain and others have said about those pesky, unwanted e-mails.
A compilation of the most notorious convicted spammers
The increased monitoring and profiling of Internet users by companies such as Google and its DoubleClick online advertising subsidiary is widely seen as one of the biggest threats to online privacy. But in reality, said university professor Paul Ohm,...
A new report warns that the cost from lost productivity at work related to the new NFL season could add up to US$10.5 billion. And there we were, thinking the biggest waste of time at work came from fielding an endless stream of IT industry reports?
Facebook, since its mistakes with the Beacon advertising incident, has rolled out one of the most robust security systems for any social network, which allows users to control who sees what information about them with great specificity. Take a look a...
Thanks to all the fear over data security breaches, a computer recycling operation has morphed into something much bigger - and potentially more lucrative - for the Saraiva brothers.
Though sometimes it's hard to pin down exactly who deserves the credit — or blame — here's a shot a some of the more familiar terms.
Most Popular Reviews
- 1 Sony Xperia Z4 Tablet (LTE) review: The tablet of choice for anyone on Android
- 2 Bose SoundLink Mini II Bluetooth speaker review
- 3 Apple MacBook Air 2015 review: Only better with time
- 4 HTC One (M8s) review: Better value for money than HTC's flagship
- 5 ZTE Blade S6 review: A dual-SIM, 4G smartphone for less than $300
Join the PC World newsletter!
Deals on PC World
- Networking, Wireless & VoIP
Deals on PC World
Latest News Articles
- Vulnerability found in Samsung smartphone keyboard
- Mac users exposed by zero-day vulnerability
- Breaking Bad-themed crypto-ransomware hits Australian computers
- Microsoft wants to kill passwords with biometric authentication in Windows 10
- How to remove the dangerous Superfish adware preinstalled on Lenovo PCs
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.