A single group of attackers accounted for a quarter of all phishing in the first half of this year, according to a new study.
Security - News
If your cash card gets eaten by the automated-teller machine, it may not end up in the hands of a bank employee.
Networks of hacked computers are being used more than ever to click on advertisements, a scam known as click fraud that cheats search engines, publishers and ad networks out of revenue.
A blogger helping to tune a friend's wi-fi network uncovered a gaping security hole in Wi-Fi cable modem routers installed in 64,000 Time Warner subscribers' homes, leaving them open to attack.
Law enforcement agencies can count a few recent victories against cybercriminals, but agents say the battle against them isn't getting any easier.
There's never been a better time to get involved in cybercrime.
DeepNines Technologies Tuesday is unveiling a desktop security agent that works in tandem with its content-filtering and anti-malware gateway to protect mobile and remote workers.
Security researchers are seeing a resurgence of Gumblar, the name for a piece of malicious code that is spread by compromising legitimate but insecure Web sites.
Microsoft last week patched nine vulnerabilities, five marked "critical," in Windows 7, a move that will require users upgrading to the new operating system starting Thursday to download a security update to keep their PCs secure.
Fake security software "SpywareGuard" and "AntiVirus" are said to be the top two scareware programs out of about 250 fake security programs detected, according to a Symantec report.
There's been a lot of fuss in the press recently about Web 2.0 security. In the past year, Facebook and Twitter both have had serious problems that have made some waves among the technically savvy.
Las Vegas: Microsoft CEO Steve Ballmer characterized the recent Sidekick data loss episode as "not good," and said he believes all the data will be recovered, but added that Microsoft will have to be more forthcoming in explaining to enterprise custo...
Data broker ChoicePoint, the victim of a 2004 data breach affecting more than 160,000 U.S. residents, has agreed to strengthen its data security efforts and pay to compensate potential victims of identity theft for a second breach in 2008, the U.S. F...
Mozilla has unblocked one of the two Microsoft-made add-ons that put Firefox users at risk from attack and will probably unblock the second in the next 48 hours, the company's head of engineering said today.
Until now, Windows Vista was the most secure version of the Windows operating system.
Most Popular Reviews
- 1 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
- 2 Sony Xperia XZ review: turbo-charged last-gen phone
- 3 Hisense Series 7 ULED 4K UHD TV review
- 4 Sony X9300D and X8500D UHD 4K TV review
- 5 Moto X Force review: Leading features from a mid-range phone
Join the PC World newsletter!
Latest News Articles
- Netgear tweaks its home security camera line by introducing the Arlo Pro
- PSA: Windows 10's Anniversary Update reactivates ads you've already disabled
- Largest DDoS attack ever delivered by botnet of hijacked IoT devices
- Hackers have a treasure trove of data with the Yahoo breach
- Judge paves the way for British hacker's extradition to US
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- Google Pixel XL full, in-depth smartphone review: The new best Android phone
- Japan Robot, gadget and car expo slideshow
- Panasonic DX900U UHD 4K smart TV review: Best all-round TV ever?
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- CCContract Systems Analyst (Oracle/Unix/WebLogic) 161020/SA/693Asia
- FTDigital Optimisation and Analytics SpecialistNSW
- CCSAP FunctionalistACT
- CCContract Junior Programmer (J2EE/Oracle/XML) 161018/JP/922Asia
- CCFunctional Consultant - MS Dynamics AXQLD
- FTDirector Data AnalyticsACT
- CCTesting Capability LeadNSW
- CCJunior Programmer (Application Dev. & Mgt.) 161017/JP/221Asia
- FT.Net CRM Dynamics Developer LeadVIC
- CCSAP Finance Business AnalystNSW
- CCE-Commerce - Senior Web DeveloperNSW
- FTProject ManagerSA
- CCProject ManagerACT
- CCServiceNow ConsultantNSW
- CCSenior Business Analyst - experience in IDAM a MUSTNSW
- CCSenior Web DeveloperNSW
- CCContract Management SpecialistNSW
- CCContract Programmer (Internet/Intranet) 161019/P/615Asia
- FTLevel 2 Service Desk AnalystVIC
- CCAcquisition Marketing Executive - B2BNSW
- CCDevOps/Automation EngineerNSW
- FTWeb DeveloperNSW
- FTFront End DeveloperSA
- CCSnr Business AnalystVIC
- CCSenior Business AnalystVIC