Given the slew of embarrassing stories you've no doubt seen about users accidentally sharing too-personal information, the idea of preserving privacy on a social network may seem like going outside during a thunderstorm and expecting to stay dry.
Our Web sites are under attack! And my company's firewall and intrusion-detection systems seem to have been giving a lot of people around here a false sense of security.
A U.S. company that says its code was copied by a Chinese Internet filtering program has ordered more PC makers not to distribute the Chinese software.
How do you make a terrible thing even worse? If you're a crook who operates a botnet -- an often-expansive network of malware-infected PCs -- you link botnets together to form a gargantuan "botnetweb." And you do it in a way that's hard for an antivi...
China will submit its wireless LAN security protocol to the International Organization for Standardization (ISO) for consideration as a global standard, years after its rejection by the standards body incensed Chinese backers.
The Kantara Initiative, formed to promote interoperability among identity verification applications and services, launched on Wednesday with big-name backers like Oracle, Intel, eBay's PayPal, AOL, CA, Novell, Fidelity Investments, Liberty Alliance, ...
Who should know more about PC threats than the company whose software makes most of them possible? Is Microsoft's upcoming, free anti-malware app the company's way of apologizing to customers?
The U.S. government has significant work to do before it can better cooperate with the private sector and other governments to better protect cybersecurity, a government cybersecurity expert said.
NEW YORK CITY -- Imagine a situation where a powerful country wants to annex its small neighbor, so it launches a week-long campaign of cyberattacks aimed at disrupting the financial, energy, telecom and media systems of its neighbor's biggest ally. ...
Twitter users who thought friends were directing them to a "funny blog" Thursday ended up experiencing something completely different: a phishing scam.
The U.S. government says it's lost - yes, lost - an entire hard drive full of sensitive data. The external drive, stored at the U.S. National Archives and Records Administration, held personal data from the Clinton era, including information about Wh...
A new attack that peppers Google search results with malicious links is spreading quickly, the U.S. Computer Emergence Response Team warned on Monday.
I am a genius. I'm charismatic, kind, and understanding. I'm also a Disney princess named Aurora and the reincarnation of Marilyn Monroe.
Cloud computing is a reality, and it's a force that IT professionals need to quickly come to terms with. The economic and social motivation for the cloud is high, the business need for speed and agility is greater than ever before, and the technology...
We've worked long and hard to come up with the best tips and tricks for your PCs, smartphones, cameras, game controllers, music players, and the Web. Let's start with PC, laptop, and networking tips.
Most Popular Reviews
- 1 Sony Xperia Z4 Tablet (LTE) review: The tablet of choice for anyone on Android
- 2 Bose SoundLink Mini II Bluetooth speaker review
- 3 Apple MacBook Air 2015 review: Only better with time
- 4 HTC One (M8s) review: Better value for money than HTC's flagship
- 5 ZTE Blade S6 review: A dual-SIM, 4G smartphone for less than $300
Join the PC World newsletter!
Deals on PC World
- Networking, Wireless & VoIP
Deals on PC World
Latest News Articles
- Vulnerability found in Samsung smartphone keyboard
- Mac users exposed by zero-day vulnerability
- Breaking Bad-themed crypto-ransomware hits Australian computers
- Microsoft wants to kill passwords with biometric authentication in Windows 10
- How to remove the dangerous Superfish adware preinstalled on Lenovo PCs
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.