Almost 80 per cent of security products failed to pass the first test required before certification, according to the latest report released by ICSA Labs.
Banging the drum for security awareness never gets old. As much as CSOs try to get folks to bone up on safe practices (both online and in the office), there are always going to be some who need reminding.
This fall, more than 20,000 stolen usernames and passwords for such Webmail providers as AOL, Gmail, Hotmail, and Yahoo appeared on Pastebin.com, a programmer's Website.
Microsoft today confirmed that exploit code published last week can compromise PCs running older versions of Internet Explorer (IE), but said its security team has not yet seen any in-the-wild attacks.
Hackers have borrowed a tactic from the world's first iPhone worm to build a botnet that steals data, including online banking credentials, from jailbroken Apple smartphones.
Cloud computing users face problems including loss of control over data, difficulties proving compliance, and additional legal risks as data moves from one legal jurisdiction to another, according to a assessement of cloud computing risks from the Eu...
A Seattle computer security consultant says he's developed a new way to exploit a recently disclosed bug in the SSL protocol, used to secure communications on the Internet. The attack, while difficult to execute, could give attackers a very powerful ...
A hacker has posted attack code that could be used to break into a PC running older versions of Microsoft's Internet Explorer browser.
An anonymous hacker has posted private e-mails, files and other documents belonging to a noted climate researcher, sparking an international debate between skeptics of global warming and those who see it as an urgent problem.
Hackers are exploiting the web users searching for information about the Twilight New Moon film, due to be released this week, in a bid to spread malware, says PC Tools.
A 19-year old New Jersey man this week was sentenced this week to a year and a day in federal prison for hacking into the Church of Scientology's Web site in Jan. 2008.
Shares of security vendor Fortinet surged 33 percent Wednesday as the company made its debut on the public markets.
Microsoft today denied that it has built a backdoor into Windows 7, a concern that surfaced yesterday after a senior National Security Agency (NSA) official testified before Congress that the agency had worked on the operating system.
Cyberattacks on the U.S. Department of Defense -- many of them coming from China -- have jumped sharply in 2009, a U.S. congressional committee reported Thursday.
House lawmakers introduced a bill that would restrict the use of peer-to-peer technology on government networks in response to several embarrassing data leaks.
Most Popular Reviews
- 1 Hisense Series 7 ULED 4K UHD TV review
- 2 Samsung Galaxy Note 7 review
- 3 Portable power: Venom Blackbook 13 Zero review
- 4 Alcatel Idol 4S review: King of the mid-range?
- 5 Samsung Galaxy S7 Edge Review
Join the PC World newsletter!
Latest News Articles
- PSA: Windows 10's Anniversary Update reactivates ads you've already disabled
- Largest DDoS attack ever delivered by botnet of hijacked IoT devices
- Hackers have a treasure trove of data with the Yahoo breach
- Judge paves the way for British hacker's extradition to US
- FBI faces lawsuit because it's stayed mum on iPhone 5c hack
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCSecurity Cleared IT Professionals - Expression of InterestSA
- CCSolution ArchitectQLD
- FTTest Manager (HP Quality Centre / ARIBA)NSW
- CCBusiness Analyst - Telecom ProjectNSW
- CCSenior Infrastrcture Project ManagerACT
- CCICT Security AuditorACT
- CCBI Reporting AnalystACT
- CCData Analyst | Data Feeds | Catalogue and MapNSW
- CCSenior .NET DeveloperVIC
- FTCustomer Solutions Engineer | Voice | Data | TelcoNSW
- CCSenior Change ManagerVIC
- FTLinux Systems AdministratorNZ
- CCContract Web Developer (160915/WD/vmp)Asia
- FTPositive Vetted ICT positions - Defence intelligence and information securityACT
- FTOutbound TelesalesVIC
- CCSenior Business Analyst -Change and SAP ProcurementNSW
- CCSolutions ArchitectACT
- CCiOS DeveloperNSW
- FTSenior Front End DeveloperNSW
- FTTechnical Business Analyst | Marketing ServicesNSW
- FTIT Pre-Sales EngineerSA
- CCProgram Manager - Data InsightVIC
- CCPMO AnalystNSW
- CCSenior Project ManagerACT
- FTOutbound TelesalesVIC