Fifty-four zero-day vulnerabilities were discovered last year, according to a report released this morning by Symantec, more than double that of 2014, and the number of megabreaches of more than 10 million records also hit a record high.
...and New Zealand continues to be their top target for ransomware and social media scams.
It’s close to a year since the Coalition government with the support of Labor pushed the data retention legislation through parliament, and the regime kicked in in October. However, telcos remain in the dark about how much funding they will receive t...
The system piggybacks onto your existing wiring to add a motion sensor, wireless on/off switch, a two-way intercom, and a siren to scare intruders away.
With privacy and secrecy functions a given in competing messaging systems, BlackBerry is dropping the subscription fee for users of the 'retract' and 'timer' functions of its cross-platform BBM messaging app.
New wireless technology developed by researchers at MIT’s Computer Science and Artificial Intelligence Lab promises to kill the Wi-Fi password at last.
One of the best pieces of security advice any computer expert can give you is to enable two-factor authentication for websites that support it. With password breaches so common nowadays, it could be the one thing that keeps hackers from stealing your...
CSO contributors Ira Winkler and Araceli Treu Gomes speak with Chris Inglis, former deputy director of the NSA, about his perceptions of Edward Snowden.
CNBC inadvertently exposed peoples' passwords after it ran an article Tuesday that ironically was intended to promote secure password practices.
A new IT security penetration testing service has given an alarming glimpse at the ease with which cyber adversaries can compromise companies and government agencies.
A malware researcher has found a few tricks to stop one of the latest types of ransomware, called Locky, from infecting a computer without using any security programs.
The battle over iPhone encryption began 18 months ago, Bloomberg reports.
Android users have been warned to read reviews on Google’s Play Store to avoid downloading malicious porn clicker-type apps to their smartphone.
An infamous piece of malware called Bayrob, first discovered in 2007, has begun to show up disproportionately, targeting A/NZ.
Cyber criminals are stealing user's login credentials for popular online streaming service, Netflix, in an attempt to steal banking information, according to recent research by Symantec.
Most Popular Reviews
- 1 Samsung Galaxy Note 7 review
- 2 Portable power: Venom Blackbook 13 Zero review
- 3 Alcatel Idol 4S review: King of the mid-range?
- 4 Witness a 241% Australian price hike: Dell Latitude 7370 review
- 5 Is this the best value phone on the market? Moto G4 Plus review
Join the PC World newsletter!
Latest News Articles
- Edward Snowden has developed an iPhone case meant to kill surveillance
- 'Mind-blowingly awesome' Telstra phishing scam detected
- Facebook Messenger flaw revealed
- Synaptics's low-cost USB fingerprint reader could bring Windows Hello to old PCs
- Microsoft breaks own design rules in dupe-the-user Windows 10 upgrade tactic
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTDigital Product Owner | Advertising Technology | SearchNSW
- CCProject Manager - open source softwareACT
- CCSolution Architect - POSVIC
- CCInfrastructure Deployment ManagerVIC
- FTDesign and Engineering - Technical WriterWA
- FTAutomation Tester- C#, Selenium | Cloud Based Finance SolutionsNSW
- CCFull stack Java Developer- NoSQL database, Amazon AWS productsNSW
- CCContract Systems Analyst (Cognos/JAVA/J2EE) 160831/SA/122Asia
- CCContract Programmer (Data/File Backup Technology) 160826/P/283Asia
- CCTechnical WriterACT
- CCDesktop Support Level 1 /2VIC
- FTSenior Full Stack .Net DeveloperVIC
- CCContract Systems Analyst (Infrastructure/JAVA) 160901/SA/486Asia
- CCContract Programmer (JAVA/HTML/PHP) 160819/P/733Asia
- CCNetwork Technology SpecialistVIC
- CCContract IT Assistant (SQL/Windows7/8/10) 160901/AP/781Asia
- CCChange Manager/ Advisor- operational environmentNSW
- CCAgile Business AnalystNSW
- FTSenior Full Stack .Net DeveloperNSW
- CCSAP IS Retail Functional LeadVIC
- CCService Desk AnalystNSW
- CCInfra & Application Specialist/ Devops SpecialistNSW
- CCContract Systems Analyst (Data Management/Web) 160818/SA/602Asia
- CCBusiness AnalystNSW
- CCProject Manager XPLANNSW