A serious flaw in a component that's used to authenticate clients on Wi-Fi networks could expose Android, Linux, BSD, and possibly Windows and Mac OS X systems to attacks.
Microsoft is working on new features for its Office 365 cloud service designed to give customers more control over their data and more visibility into how it's being accessed.
For CIOs worried about access to shared resources in the cloud and the data center, Centrify has launched an identity-management service that aims to improve protection for IT management accounts
VMware is combining iOS and Android encryption features with its own network virtualization platform to offer more secure access to enterprise applications and resources.
In the latest blow to Internet of Things (IoT) security, an analysis of smart home devices has found flaws that could give attackers access to sensitive data or allow them to control door locks and sensors.
A new open-source tool can periodically scan an area for rogue Wi-Fi access points and can alert network administrators if any are found.
A Chinese Internet administrator blasted Google on Thursday, after the U.S. search giant decided to stop recognizing digital certificates issued by the group following a security lapse.
Salesforce.com has acquired Toopher, the developer of a mobile two-factor authentication app that uses location-awareness.
Over the last few days, a large number of British Airways customers have found that reward points they accumulated for flights, called Avios, have disappeared from their accounts. Others have been locked out of their accounts completely.
Some Internet gateway devices commonly used by hotels and conference centers can easily be compromised by hackers, allowing them to launch a variety of attacks against guests accessing the Wi-Fi networks.
Cisco Systems released firmware updates for several routers and switches that run its IOS and IOS XE software in order to fix flaws in their autonomic networking infrastructure (ANI) feature.
Attackers could have remotely installed malware on systems running a flawed Dell support tool used to detect customers' products.
Flash files that are vulnerable to a serious flaw patched by Adobe Systems over three years ago still exist on many websites, exposing users to potential attacks.
You don't need to be the NSA to tap calls on Cisco's SPA 300 and 500 IP phones: An authentication flaw allows potential attackers to do that by default.
More than 700,000 ADSL routers provided to customers by ISPs around the world contain serious flaws that allow remote hackers to take control of them.
Gadgets & Things
Most Popular Reviews
- 1 Finally! LG OLED TV 2016 range review
- 2 Google Daydream View VR full, in-depth review
- 3 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
- 4 Apple iPhone 7 Plus review: including Portrait Mode
- 5 MSI GS70 laptop review
Join the PC World newsletter!
Latest News Articles
- AMD packs more horsepower into GPUs with new Radeon ReLive software
- Cortana for iOS, Android now features quick access to common actions
- Russian cyberspies likely behind DNC breach move on to German election
- Microsoft's vision for LinkedIn is about tying its business data into Office and other services
- Facebook's Year in Review for 2016 isn't just fun and games
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- The top 10 best and worst tech gadgets and products of 2016
- TV of the year award 2016
- Best phone of the year 2016
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- CCSAP HR/Payroll Training Manager / Instructional DesignerNSW
- CCMainframe Developer (with ASP.NET)NSW
- FTSenior Project Manager / Program ManagerNSW
- CCCapacity and Performance AnalystVIC
- CCTechnical SpecialistNSW
- CCInfrastructure Architect - Immediate Start - Migration Project -Hyper-V & VMWareNSW
- CCSalesforce DeveloperNSW
- FT2nd Level Desktop Support Analyst l SCCMNSW
- CCIAM Technical Specialist/ConsultantWA
- CCProject Management - Infrastructure projectsVIC
- CCFinancial AnalystACT
- CCUNISON Analyst Programmer (Contract) FinanceNSW
- FTCommercial, Contract, Vendor ManagementVIC
- CCSenior Project Coordinator - Banking/Financial ServicesNSW
- CCBI/DW Lead DeveloperVIC
- FTDatacentre Solution ArchitectVIC
- FTTechnical Business AnalystNSW
- CCJava DeveloperWA
- CCDigital Producer | 3 Month Contract roleNSW
- FTSecurity EngineerVIC
- CCSAP HR & Payroll Project ManagerACT
- TPProject ManagerVIC
- CCMid-level .NET Developer/Programmer - Finance - Contract - Sydney CBDNSW
- FTIT Specialist - Application Blueprinting Engineer ( Developer)NSW
- FTStorage Systems Administrator l HDS & EMC TechnologiesNSW