On 26 June, Kaspersky Lab held its 10th annual Virus Analysts Summit in Dubrovnik, Croatia. At the event the company's chief security researchers discussed the latest online threats to target businesses and consumers.
IPv6 -- the next-generation Internet protocol -- isn't keeping too many U.S. CIOs and network managers up worrying at night. But perhaps it should.
Creators of Waledac malware enlisted the Conficker botnet as a tool to spread malware of their own, marking the first time Conficker was made available for hire, according to Cisco's mid-year security report.This was symptomatic of a wider trend Cisc...
Oracle on Tuesday released its latest quarterly patch update, which includes 10 security fixes for its database and also addresses a range of vulnerabilities across the vendor's applications portfolio.
Microsoft today warned of a serious security vulnerability in a Spreadsheet ActiveX control that could allow for a drive-by-download attack against vulnerable PCs.
Stephane Herry says that he founded his private file-sharing network GigaTribe out of frustration at not being able to share files with his friends on Kazaa. Every time he searched for a file that he knew a friend had uploaded, he saw only similar fi...
Do you trust Google? If you use its multitude of online services on a daily basis you might, but is that assumption wise? For some, Google is a wonderful company with a broad selection of useful online tools that make life easier, but for others Goo...
In 1989, Eugene Kaspersky ran afoul of the Cascade virus while working for the Ministry of Defence in the heart of the Soviet Union. He defeated it with his wits and a pencil.
China did a sudden about-face late yesterday and decided to delay its controversial requirement that all computers sold after July 1 must come with Web filtering software.
Open source security is a hot topic in the IT world. Some people believe that open source solutions are a potential playground for mischief-makers and cyber criminals, while others swear they’re safer than proprietary software.
Today more than ever, good network security is vital to businesses of all sizes. Cybercriminals, equipped with sophisticated software that automates the task of seeking out vulnerabilities, aren't focusing on large enterprises alone; any easy target ...
With all the outrage over The Pirate Bay going legit, I think it's time to reconsider the merits of illegally media sharing. The world has changed since Napster introduced peer-to-peer file sharing in 1999, and the culture that made the practice seem...
The Pirate Bay, a torrent site that has attracted millions of users by offering a wealth of (often illegal) content, is now at a turning point. With a $3.8 million fine dangling around the neck of the owners and a fresh $7.8 million acquisition by Gl...
Ah, the Internet cafe, home to yuppies, flavored lattes, and The Pirate Bay? If you haven't heard, Swedish Internet cafe operator, Global Gaming Factory X, today bought The Pirate Bay for $7.8 million. The new owner says it intends to sail The Pirat...
Sometimes, it seems scams are becoming almost as common as social media experts on Twitter. The latest one, unleashed Monday morning and initially noticed by tech blog Mashable, centers on a fake blog hosted at the domain twittersblogs.com. Tweets co...
Most Popular Reviews
- 1 Witness a 241% Australian price hike: Dell Latitude 7370 review
- 2 Is this the best value phone on the market? Moto G4 Plus review
- 3 Sony Xperia X Performance review: Sony’s most disappointing product in years
- 4 Huawei P9 review: lifting photography to another level... sometimes.
- 5 Huawei Mate 8 review: probably the best all-round Android phone you can buy
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- Edward Snowden has developed an iPhone case meant to kill surveillance
- 'Mind-blowingly awesome' Telstra phishing scam detected
- Facebook Messenger flaw revealed
- Synaptics's low-cost USB fingerprint reader could bring Windows Hello to old PCs
- Microsoft breaks own design rules in dupe-the-user Windows 10 upgrade tactic
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTSocial Media AssistantQLD
- CCOracle Identity and Access Management Specialist-11Gr2 productsNSW
- FTIT Helpdesk (Microsoft)NSW
- FTRuby on Rails DeveloperNSW
- CCAccounts Reconciliation Officer/ AdministratorNSW
- FTContinuous delivery application deployment automation specialist (DevOps)NSW
- CCAgile Performance Tester- Bamboo, Jenkins, Confluence, JiraNSW
- CCSQL DeveloperNSW
- FTEnvironment Management AnalystACT
- CCSenior Project OfficerACT
- CCBusiness AnalystNSW
- FTSAP ESB Service Management SpecialistVIC
- CCDatabase developer/ModellerACT
- CCCRM DeveloperACT
- CCContract Programmer (JAVA/J2EE/SQL) 160729/P/698Asia
- CCSales Support Associate - TelecommunicationsNSW
- CCSenior Systems SpecialistNSW
- FTProject Coordinator- NSW Government - reform BackgroundNSW
- CCVendor ManagerVIC
- FTPortfolio Governance AnalystVIC
- CCBPM Solution ArchitectVIC
- CCSenior Process Analyst - Sydney CBDNSW
- FTProject CoordinatorQLD
- CCBusiness Analyst/ Scrum MasterNSW
- CCSenior Tester - Automation / Telecommunications (Urgent)NSW