The antivirus engine used in multiple Symantec products had an easy to exploit vulnerability that could have allowed hackers to easily compromise computers.
Cyber-security company, ESET, has reported an increasingly common Facebook scam.
Google has reduced spam reaching inboxes to a fraction of a percent, but in the process sometimes misclassifies bulk-mailed messages like monthly statements and ticket receipts.
Several antivirus products from security firm ESET had a critical vulnerability that was easy to exploit and could lead to a full system compromise.
Windows 10 will have a new mechanism that will allow software developers to integrate their applications with whatever antimalware programs exist on users' computers.
In an era when businesses are scrambling to defend against sophisticated advanced persistent threats (APTs), signature-based antivirus may seem like a relic.
Security vendor Malwarebytes has flagged the Dell System Detect tool as a potentially unwanted application after older versions of the program were found to put computers at risk.
In addition to personal phone numbers and email addresses for hundreds of people who corresponded with him, there's something else inside the cache of emails that Jeb Bush released this week: computer viruses.
VirusTotal, a Google-owned online malware scanning service, is creating a whitelist of products from large software vendors to reduce bad detections by antivirus programs.
Facebook has partnered with antivirus firm ESET to offer users the ability to scan their computers for malware directly from inside the social networking site.
Antivirus firm Bitdefender unveiled a hardware security appliance for home networks Tuesday that aims to protect devices by scanning network traffic to detect and block potential security threats.
A new malware program called Poweliks attempts to evade detection and analysis by running entirely from the system registry without creating files on disk, security researchers warn.
It's generally accepted that antivirus programs provide a necessary protection layer, but organizations should audit such products before deploying them on their systems because many of them contain serious vulnerabilities, a researcher warned.
Following a downward trend during the past two years, the number of new rootkit samples rose in the first quarter of this year to a level not seen since 2011, according to statistics from security vendor McAfee.
A vulnerability allows attackers to disable Microsoft's antimalware products by sending specifically crafted files to users via websites, email or instant messaging applications.
Most Popular Reviews
- 1 Hisense Series 7 ULED 4K UHD TV review
- 2 Samsung Galaxy Note 7 review
- 3 Portable power: Venom Blackbook 13 Zero review
- 4 Alcatel Idol 4S review: King of the mid-range?
- 5 Samsung Galaxy S7 Edge Review
Join the PC World newsletter!
Latest News Articles
- US carriers will look to LTE-U tests to protect Wi-Fi
- Google will shore up one of its biggest cloud weaknesses next year
- White House to data scientists: We need you
- FBI reports more attempts to hack voter registration system
- Home Theatre review: Which is better, a 4K projector or 4K TV?
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCService Desk analystSA
- FTIT Pre-Sales EngineerSA
- CCBusiness Analyst with change management experienceACT
- FTPositive Vetted ICT positions - Defence intelligence and information securityACT
- FTOutbound TelesalesVIC
- FTBusiness Development Manager | ICT intelligent systems integrationVIC
- FTSenior Front End DeveloperNSW
- FTCustomer Solutions Engineer | Voice | Data | TelcoNSW
- CCJava / J2ee ProgrammersACT
- FTTechnical Business Analyst | Marketing ServicesNSW
- CCSolutions ArchitectACT
- CCICT Security AuditorACT
- CCProgram Manager - Data InsightVIC
- CCSecurity Cleared IT Professionals - Expression of InterestSA
- FTLinux Systems AdministratorNZ
- CCBusiness ArchitectNSW
- FTDesktop/Application SupportVIC
- FTCertification and Accreditation Security ConsultantACT
- CCNetwork and Security EngineerNSW
- CCSenior Project ManagerACT
- FTCarrier/ Industrial Network ConsultantsWA
- CCSenior .NET DeveloperVIC
- FTOutbound TelesalesVIC
- FTScrum Master | High Profile FintechNSW
- FTMDM EngineerNSW