Over 5,000 devices used by gas stations in the U.S. to monitor their fuel tank levels can be manipulated from the Internet by malicious attackers.
Google ignored Microsoft's calls for flexible vulnerability disclosure deadlines and released details of another unpatched Windows flaw, leaving users exposed for at least the next 25 days.
A vulnerability in Asuswrt, the firmware running on many wireless router models from Asustek Computer, allows attackers to completely compromise the affected devices. Malicious hackers, however, need to launch their attacks from within the local netw...
Apple has fixed an issue that could have allowed attackers to launch brute-force attacks against iCloud users in order to guess their passwords.
Moonpig, a large online seller of personalized greeting cards and gifts, shut down its mobile apps Tuesday because of a security weakness that could have given hackers access to customer information.
A new open-source tool can be used to launch phishing attacks against users of wireless networks in order to steal their Wi-Fi access keys.
The attackers who stole information about 83 million JPMorgan Chase customers earlier this year gained a foothold on the company's network because a server reportedly lacked two-factor authentication.
The "grinch" Linux vulnerability that Alert Logic raised alarms about Tuesday is not a vulnerability at all, according to Red Hat.
A serious vulnerability in an embedded Web server used by many router models from different manufacturers allows remote attackers to take control of affected devices over the Internet.
Subdomains that once served a purpose but later were forgotten by website administrators can be abused by hackers to attack users of sites under the same main domain.
Many gamers couldn't access Sony's PlayStation Network (PSN) for hours on Sunday evening after an apparent attack against the service. The PlayStation Store was also reportedly affected.
Vodafone UK isn't letting its customers access the website of the Chaos Computer Club (CCC), one of the oldest and largest associations of computer hackers in Europe.
The destructive malware program that the FBI alerted some companies about this week was likely used against Sony Pictures Entertainment, according to technical evidence found by researchers in the program's code.
A vulnerability in the IBM Endpoint Manager for mobile devices could allow attackers to execute malicious code on the servers used by companies to manage devices.
Cybercriminals are using malware designed to steal payment card information from point-of-sale systems to also infect ticket vending machines and electronic kiosks.
Most Popular Reviews
- 1 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
- 2 Sony Xperia XZ review: turbo-charged last-gen phone
- 3 Hisense Series 7 ULED 4K UHD TV review
- 4 Sony X9300D and X8500D UHD 4K TV review
- 5 Moto X Force review: Leading features from a mid-range phone
Join the PC World newsletter!
Latest News Articles
- Physical RAM attack can root Android and possibly other devices
- Chinese firm recalls camera products linked to massive DDOS attack
- Not robocop, but robojudge? AI learns to rule in human rights cases
- French surveillance law is unconstitutional after all, highest court says
- WikiLeaks says it doesn’t collaborate with states
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- Google Pixel XL full, in-depth smartphone review: The new best Android phone
- Japan Robot, gadget and car expo slideshow
- Panasonic DX900U UHD 4K smart TV review: Best all-round TV ever?
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- CCField EngineerVIC
- CCSolution ArchitectNSW
- CCQA Test Lead- Digital, Mobile, UX, AGILE, CloudNSW
- CCICT Project Reporting Planning CoordinatorNSW
- FTJava Script, Frontend Developer- DynamoDB or MongoDBNSW
- FTProject ManagerSA
- FTSenior Analyst ProgrammerNSW
- CCSAP Finance Business AnalystNSW
- CCProgram ManagerACT
- CCChange ManagerQLD
- CCContract IT Assistant (PC LAN Support) 161017/ITA/742Asia
- CCTechnology TrainerNSW
- CCSenior Business AnalystVIC
- FTDelivery LeadNSW
- CCImplementation ManagerVIC
- CCCommunications ManagerVIC
- CCCloud Security Services SpecialistVIC
- CCAnalyst Programmer (12-Month Renewable Contract)Asia
- FTTest ManagerNSW
- CCDigital Producer - 3 Month Contract Immediate Start!NSW
- CCContract Computer Operator (UNIX/Windows-based) 161014/CO/vmtAsia
- CCSAP Release & Deployment ManagerNSW
- CCNetwork Designer/ConsultantVIC
- CCContract Junior Programmer (J2EE/SQL) 161019/JP/552Asia
- FTSenior .Net Software EngineerVIC