The antivirus engine used in multiple Symantec products had an easy to exploit vulnerability that could have allowed hackers to easily compromise computers.
Cyber-security company, ESET, has reported an increasingly common Facebook scam.
Google has reduced spam reaching inboxes to a fraction of a percent, but in the process sometimes misclassifies bulk-mailed messages like monthly statements and ticket receipts.
Several antivirus products from security firm ESET had a critical vulnerability that was easy to exploit and could lead to a full system compromise.
Windows 10 will have a new mechanism that will allow software developers to integrate their applications with whatever antimalware programs exist on users' computers.
In an era when businesses are scrambling to defend against sophisticated advanced persistent threats (APTs), signature-based antivirus may seem like a relic.
Security vendor Malwarebytes has flagged the Dell System Detect tool as a potentially unwanted application after older versions of the program were found to put computers at risk.
In addition to personal phone numbers and email addresses for hundreds of people who corresponded with him, there's something else inside the cache of emails that Jeb Bush released this week: computer viruses.
VirusTotal, a Google-owned online malware scanning service, is creating a whitelist of products from large software vendors to reduce bad detections by antivirus programs.
Facebook has partnered with antivirus firm ESET to offer users the ability to scan their computers for malware directly from inside the social networking site.
Antivirus firm Bitdefender unveiled a hardware security appliance for home networks Tuesday that aims to protect devices by scanning network traffic to detect and block potential security threats.
A new malware program called Poweliks attempts to evade detection and analysis by running entirely from the system registry without creating files on disk, security researchers warn.
It's generally accepted that antivirus programs provide a necessary protection layer, but organizations should audit such products before deploying them on their systems because many of them contain serious vulnerabilities, a researcher warned.
Following a downward trend during the past two years, the number of new rootkit samples rose in the first quarter of this year to a level not seen since 2011, according to statistics from security vendor McAfee.
A vulnerability allows attackers to disable Microsoft's antimalware products by sending specifically crafted files to users via websites, email or instant messaging applications.
Gadgets & Things
Most Popular Reviews
- 1 Finally! LG OLED TV 2016 range review
- 2 Google Daydream View VR full, in-depth review
- 3 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
- 4 Apple iPhone 7 Plus review: including Portrait Mode
- 5 MSI GS70 laptop review
Join the PC World newsletter!
Latest News Articles
- Intel, Microsoft going long distance with Cortana on Windows 10 PCs
- Obama orders review of election hacks as Trump doubts Russia's role
- Ransomware attacks against businesses increased threefold in 2016
- Attackers use hacked home routers to hit Russia's 5 largest banks
- US mulls rules for airlines that plan in-flight Wi-Fi voice calls
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- The top 10 best and worst tech gadgets and products of 2016
- TV of the year award 2016
- Best phone of the year 2016
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- CCUI DesignerNSW
- FTFront End DeveloperVIC
- CCUnix Developers - multipleACT
- CCSystems AdministratorQLD
- TPFrontend DeveloperNSW
- CCProject Manager - Procurement System ImplementationNSW
- CCITSM Process ExpertNSW
- FTIT Software Asset Management CoordinatorWA
- CCSenior PMO Coordinator, FinanceNSW
- FTBusiness Intelligence Technical AnalystVIC
- FTPaid Search SpecialistNSW
- CCEOI - TIBCO DeveloperSA
- CCProject Manager - Scrum MasterNSW
- TPBusiness AnalystACT
- FTAgile Business AnalystQLD
- FTProject Manager - Security Operations CentreVIC
- CCProject Manager/Scrum MasterNSW
- CCSenior Platform Developer/ArchitectNSW
- CCOBIEE/ Oracle BI Analyst- Informatica & DACNSW
- CCSenior Networks EngineerVIC
- FTTechnical Business AnalystNSW
- FTSenior Project Manager - Large Site relocation projectNSW
- CCJAVA Developer- XML, SOAP, GIS, Web services, SPRINGNSW
- CCSolution Designer - MulesoftVIC
- CCCyber Security Analyst - TelcoVIC