Cyberattacks on the U.S. Department of Defense -- many of them coming from China -- have jumped sharply in 2009, a U.S. congressional committee reported Thursday.
House lawmakers introduced a bill that would restrict the use of peer-to-peer technology on government networks in response to several embarrassing data leaks.
The National Security Agency (NSA) worked with Microsoft on the development of Windows 7, an agency official acknowledged yesterday during testimony before Congress.
Fraudsters may have a hot deal waiting for them in the form of an obscure Chinese domain name that's for sale on the Internet.
Windows users running 64-bit versions of the operating system are less likely to get infected by attack code, Microsoft's security team said yesterday.
A new report from a mobile security vendor details how the most popular smartphones, including the iPhone, are very vulnerable to man-in-the-middle attacks, carried out via public Wi-Fi connections.
Nations that want to disrupt their enemies' banking, media and government resources don't need their own technical skills; they can simply order botnet attack services from cybercriminals.
Microsoft has settled a lawsuit with a former employee that it once charged with fraud, misappropriation of trade secrets and breach of contract.
An effort is underway to clean up tens of thousands of computers infected with malicious software known for churning out thousands of spam messages per hour.
Workers at T-Mobile UK have been selling customer data to brokers who work for the competition, T-Mobile and the U.K.'s Information Commissioner's Office said on Tuesday.
U.K. police are hailing the sentencing of four people who used a sophisticated Trojan horse program to siphon money out of online bank accounts and send it to Eastern European countries and Russia.
In the face of mounting threats from hackers, MasterCard will use mobile phones to improve security for online transactions, the company said on Monday.
Amazon's cloud computing service should not be used for applications that require advanced security and availability, the Burton Group analyst firm says in a report accusing Amazon of secrecy regarding its cloud data centers.
Two computer programmers who worked for Bernard L. Madoff Investment Securities were arrested Friday and charged in connection with the multibillion dollar Ponzi scheme run by their former boss.
Microsoft late on Friday confirmed that an unpatched vulnerability exists in Windows 7, but downplayed the problem, saying most users would be protected from attack by blocking two ports at the firewall.
Most Popular Reviews
- 1 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 2 D-Link Taipan AC3200 Ultra tri-band modem-router review
- 3 Dell XPS 13 (2016) review: Making the very best Ultrabook
- 4 Microsoft Surface Book review: The verdict on Microsoft's first notebook
- 5 Telstra Wi-Fi 4GX Advanced III review: Testing the world's first 600Mbps wireless hotspot
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- Facebook Messenger flaw revealed
- Synaptics's low-cost USB fingerprint reader could bring Windows Hello to old PCs
- Microsoft breaks own design rules in dupe-the-user Windows 10 upgrade tactic
- No more passwords with Google's Trust API
- There’s finally reason to hope in the war against ransomware
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTBusiness Analyst - Clinical SystemsSA
- CC.net DeveloperACT
- FTStorage ConsultantACT
- FTSenior Architect, TechnologyNSW
- FTIT Support Analyst (Renewal Contract)Asia
- CCTechnology and Security ArchitectACT
- CCApplication Support Analyst and Database AdministratorVIC
- CCMicrosoft .NET Developer (Server and Applications)SA
- FTNetwork Engineer | Canberra | NV1 NV2 clearance | Defence projectsNSW
- CCSystems Engineer | Experimental military technology | NV1ACT
- CCContract Analyst Programmer (JAVA/SQL) 160617/AP/623Asia
- CCSolution Architect - PayrollNSW
- CCIT Change Coordinator / AnalystNSW
- CCIT Assistant (Lotus Notes/Technical Support) 160616/ITA/991Asia
- FTBusiness Analyst/Data Analyst Capability ManagerVIC
- CCSAP PI/PO ConsultantVIC
- CCBusiness Analyst- Process Mapping Specialist- Gov / Bank backgdNSW
- FTSoftware Services Team LeaderNSW
- FTIT Project Coordinator- Data Center Infrastructure backgroundNSW
- CCInside Sales Specialist / Customer Service - TelecommunicationsNSW
- CCiOS developerNSW
- CCContract Programmer (JAVA/J2EE/SQL) 160628/P/133Asia
- CCDevOps /Systems AdministratorQLD
- CCNetwork EngineerVIC
- FTService Desk AnalystNSW