NSA whistleblower Edward Snowden has come up with a concept iPhone case that can help prevent the government from finding your location.
A sophisticated phishing email purporting to be from Telstra has been identified by MailGuard. "It's just mind-blowingly awesome," the security vendor's CEO Craig McDonald said on Monday.
A new Facebook Messenger vulnerability has been detected that makes it possible for an attacker to modify or remove any sent message including rich content such as photos, files, and links.
Your five-year old laptop may be able to use Windows Hello relatively cheaply if Synaptics has its way.
Microsoft's interpretation of the "Close" button in a notification of an impending Windows 10 upgrade is contrary to its own design guidelines.
Google remains on its quest to replace passwords with something more secure. The latest effort is from the company’s Project Abacus, which favors a system of biometrics to authenticate identity.
Now when ransomware tries to take over your computer, there’s something you can be sides pay up: stop it, buy more time to deal with it or mitigate the damage it might do, Security BSides Boston conference was told.
A hacker is trying to sell a database dump containing account records for 167 million LinkedIn users.
Many cybercriminals can call on an extensive network of specialists for "business" expertise, including people who train and recruit, who launder money, and who provide escrow services, according to a new white paper.
Microsoft today opened the preview of its Windows Defender Advanced Threat Protection to all enterprise IT professionals.
Researchers from Kaspersky Lab have developed a method of decrypting files affected with the latest version of CryptXXX, a malware program that combines ransomware and information stealing capabilities.
Bangalore Bank, a commercial bank in Vietnam and ... Sony Pictures are the unlikely bedfellows in a tale of cyber intrigue uncovered by security researchers at BAE Systems.
At Interop 2016, Avi Freedman, CEO of Kentik, chats with Network World about why Distributed Denial of Service (DDoS) attacks are still popular with hackers, why they still work, and some of the signs that an attack may soon commence.
At Interop 2016, Network World chats with John Pironti, president of IP Architects, about why ransomware is on the rise, and why many consumers and businesses are paying the ransom.
All blogs hosted on Google's blogspot.com domain can now be accessed over an encrypted HTTPS connection.
Most Popular Reviews
- 1 Witness a 241% Australian price hike: Dell Latitude 7370 review
- 2 Is this the best value phone on the market? Moto G4 Plus review
- 3 Sony Xperia X Performance review: Sony’s most disappointing product in years
- 4 Huawei P9 review: lifting photography to another level... sometimes.
- 5 Huawei Mate 8 review: probably the best all-round Android phone you can buy
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- Edward Snowden has developed an iPhone case meant to kill surveillance
- 'Mind-blowingly awesome' Telstra phishing scam detected
- Facebook Messenger flaw revealed
- Synaptics's low-cost USB fingerprint reader could bring Windows Hello to old PCs
- Microsoft breaks own design rules in dupe-the-user Windows 10 upgrade tactic
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTSocial Media AssistantQLD
- CCSenior Systems SpecialistNSW
- CCContract Analyst Programmer (JAVA/Oracle) 160728/AP/623Asia
- FTSenior Natural/ADABAS ProgrammerSA
- CCPractice Lead - Java, FrontendVIC
- CCSenior PHP Developer (12 month contract )VIC
- CC.NET DeveloperQLD
- CCSolution Architect - Supply ChainNSW
- FTJava DeveloperVIC
- CCContract IT Assistant (Office Automation/PC LAN) 160802/ITA/991Asia
- FTSenior Business Analyst - InsuranceVIC
- CCMac (iOS) Support Engineer - $30 p/h - Three Year ContractNSW
- CCProject Services CoordinatorACT
- CCOSS/BSS Solution ArchitectVIC
- CCSenior Agile Java/Spring/AngularJS EngineerNSW
- CCSenior Contracts Officer/Procurement -Governmen BckgrndNSW
- CCContract Analyst Programmer (Java/SQL) 160721/AP/624Asia
- CCSystems AdministratorSA
- FTProject Coordinator- NSW Government - reform BackgroundNSW
- CCReport Business Analyst- BI, Oracle, SAP, TableauNSW
- FTSAP PI ABAP SpecialistVIC
- CCBusiness Project ManagerVIC
- CCProject Coordinator/ Jr Business Analyst- Govt backgroundNSW
- CCCommunication LeadVIC
- CCBusiness AnalystQLD