Fifty-four zero-day vulnerabilities were discovered last year, according to a report released this morning by Symantec, more than double that of 2014, and the number of megabreaches of more than 10 million records also hit a record high.
...and New Zealand continues to be their top target for ransomware and social media scams.
It’s close to a year since the Coalition government with the support of Labor pushed the data retention legislation through parliament, and the regime kicked in in October. However, telcos remain in the dark about how much funding they will receive t...
The system piggybacks onto your existing wiring to add a motion sensor, wireless on/off switch, a two-way intercom, and a siren to scare intruders away.
With privacy and secrecy functions a given in competing messaging systems, BlackBerry is dropping the subscription fee for users of the 'retract' and 'timer' functions of its cross-platform BBM messaging app.
New wireless technology developed by researchers at MIT’s Computer Science and Artificial Intelligence Lab promises to kill the Wi-Fi password at last.
One of the best pieces of security advice any computer expert can give you is to enable two-factor authentication for websites that support it. With password breaches so common nowadays, it could be the one thing that keeps hackers from stealing your...
CSO contributors Ira Winkler and Araceli Treu Gomes speak with Chris Inglis, former deputy director of the NSA, about his perceptions of Edward Snowden.
CNBC inadvertently exposed peoples' passwords after it ran an article Tuesday that ironically was intended to promote secure password practices.
A new IT security penetration testing service has given an alarming glimpse at the ease with which cyber adversaries can compromise companies and government agencies.
A malware researcher has found a few tricks to stop one of the latest types of ransomware, called Locky, from infecting a computer without using any security programs.
The battle over iPhone encryption began 18 months ago, Bloomberg reports.
Android users have been warned to read reviews on Google’s Play Store to avoid downloading malicious porn clicker-type apps to their smartphone.
An infamous piece of malware called Bayrob, first discovered in 2007, has begun to show up disproportionately, targeting A/NZ.
Cyber criminals are stealing user's login credentials for popular online streaming service, Netflix, in an attempt to steal banking information, according to recent research by Symantec.
Most Popular Reviews
- 1 Witness a 241% Australian price hike: Dell Latitude 7370 review
- 2 Is this the best value phone on the market? Moto G4 Plus review
- 3 Sony Xperia X Performance review: Sony’s most disappointing product in years
- 4 Huawei P9 review: lifting photography to another level... sometimes.
- 5 Huawei Mate 8 review: probably the best all-round Android phone you can buy
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- Edward Snowden has developed an iPhone case meant to kill surveillance
- 'Mind-blowingly awesome' Telstra phishing scam detected
- Facebook Messenger flaw revealed
- Synaptics's low-cost USB fingerprint reader could bring Windows Hello to old PCs
- Microsoft breaks own design rules in dupe-the-user Windows 10 upgrade tactic
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTSocial Media AssistantQLD
- CCIT Project Manager - Data Centre ProjectNSW
- CCSenior Project OfficerACT
- CCSenior Architect - CloudVIC
- FTApplication Support AnalystSA
- CCCRM DeveloperACT
- FTSenior .Net Applications SupportACT
- FTProgram Master SchedulerVIC
- CCPeopleSoft Consultant (Financial)NSW
- CCSenior Agile Java/Spring/AngularJS EngineerNSW
- CCEnvironment Support AnalystQLD
- CCSAP MM / Ariba Functional ConsultantNSW
- CCUser Access Review (UAR) DeveloperVIC
- FTSCCM Applications PackagerWA
- CCPre-Sales Consulting Business AnalystVIC
- CCSenior Contracts Officer/Procurement -Governmen BckgrndNSW
- CCDirector - Technical Upgrade Program- Data migration, InfraNSW
- FTDesktop Support Engineer (Renewable Contract)Asia
- CCProject Manager, Credit CardsNSW
- CCProject Manager/ Sr PMO Analyst - Consulting BackgroundNSW
- CCTest ManagerNSW
- FTBusiness Development ManagerVIC
- FTDefence Network EngineerACT
- CCBPM Solution ArchitectVIC
- FTNetwork Infrastructure SpecialistSA