A hacker extracted customer log-in credentials from a server owned by Bitdefender that hosted the cloud-based management dashboards for its small and medium-size business clients.
Windows 10 will have a new mechanism that will allow software developers to integrate their applications with whatever antimalware programs exist on users' computers.
Aggressive adware applications that break the trust between HTTPS (HTTP Secure) websites and users have been at the center of controversy lately. But over the past week, HTTPS interception flaws of varying severity were also found in security program...
Users who visited the site of the state-run North Korean news agency, to see the country's response to the Sony hacking accusations or for other reasons, might want to scan their computers for malware.
A variant of the Remote Control System (RCS) malware developed by an Italian company called Hacking Team is masquerading as a bookmark management application called Linkman, according to the main developer of a new malware scanning tool.
Antivirus firm Bitdefender unveiled a hardware security appliance for home networks Tuesday that aims to protect devices by scanning network traffic to detect and block potential security threats.
One of the first things a malware analyst does when encountering a suspicious executable file is to extract the text strings found inside it, because they can provide immediate clues about its purpose. This operation has long been considered safe, bu...
Cybercriminals are increasingly infecting computers with malware that resides only in memory in order to make their attacks harder to detect.
The cybercriminal gang behind the Kelihos botnet is tricking users into installing malware on their computers by appealing to pro-Russian sentiments stoked by recent international sanctions against the country.
Cybercriminals are in the process of rebuilding the Gameover Zeus (GOZ) botnet, which law enforcement authorities took over in June, and recent research suggests that they've had some success, especially in the U.S.
It's generally accepted that antivirus programs provide a necessary protection layer, but organizations should audit such products before deploying them on their systems because many of them contain serious vulnerabilities, a researcher warned.
A vulnerability present in most Android devices allows apps to initiate unauthorized phone calls, disrupt ongoing calls and execute special codes that can trigger other rogue actions.
An unknown person or group reportedly stole the cryptographic key used by Nokia to digitally sign applications for Symbian OS and extorted millions of euros from the company in 2007 by threatening to make the key public.
A newly discovered vulnerability that allows spying on encrypted SSL/TLS communications has been identified and fixed in the widely used OpenSSL library.
The recent effort to disrupt the Gameover Zeus botnet includes plans for Internet service providers to notify victims, but some security researchers think ISPs should play an even bigger role in the future by actively quarantining infected computers ...
Microsoft L5V-00027 Sculpt Ergonomic Keyboard Desktop
Smart LED Bulb LB130
Everki ContemPRO Roll Top Laptop Backpack
Linksys AC5400 MU-MIMO Gigabit router
Epson EcoTank Expression ET-2500
Samsung portable 1TB T3 drive
Lexar® JumpDrive® S57 USB 3.0 flash drive
UE Boom 2 Bluetooth speaker
Logitech G403 Prodigy mouse
3SIXT Ultra HD Sports Action Camera
Google Daydream VR headset
Acer Swift 7
Lexar® JumpDrive® S45 USB 3.0 flash drive
Belkin MIXIT Metallic Lightning to USB Cable
Lexar® Portable SSD
Huawei Mate 9
Lexar® JumpDrive® C20c USB Type-C flash drive
HD Pan/Tilt Wi-Fi Camera with Night Vision NC450
Surface Pro 4
Blade 28 backpack by Arc’teryx
Lexar® Professional 1800x microSDHC™/microSDXC™ UHS-II cards
Dell XPS 13 laptop
HP Pavilion x360 13”
Audio-Technica ATH-ANC70 Noise Cancelling Headphones
Garmin Fenix Chronos smartwatch
Dell Inspiron 5000 series 2-in-1
Most Popular Reviews
- 1 Huawei Mate 9 full in-depth smartphone review
- 2 ZTE Axon 7 review: Is ZTE dumping old stock on Australia?
- 3 Oppo R9s smartphone full review
- 4 Finally! LG OLED TV 2016 range review
- 5 Huawei Nova Plus smartphone review
Join the PC World newsletter!
Latest News Articles
- Apple, Microsoft and Amazon offer fairer deal on cloud storage
- Hackers behind bank attack campaign use Russian as decoy
- Microsoft eyes Indian startups for cloud services
- Horizon Zero Dawn review
- New Zealand High Court clears Kim Dotcom extradition to the US
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- How to quit Pokemon Go (or to start enjoying it again)
- Huawei Mate 9 full in-depth smartphone review
- Time to ditch Foxtel and the iQ3: How to replace Foxtel packages with cheaper alternatives
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- TPSenior Business AnalystQLD
- CCLevel 2 Helpdesk Support (CISCO)QLD
- CCTechnical Consultant - ITSM/HP Service ManagerNSW
- TPIT Project Manager - Office relocationVIC
- CCTest AnalystQLD
- TP.Net DeveloperSA
- FTBranch Practice Manager - SecurityQLD
- TPHRIS Business AnalystQLD
- CCSenior Project Manager x 2QLD
- FTDatabase DeveloperACT
- TPProduct Owner - Cloud SolutionsQLD
- CCUser ResearcherNSW
- FTOracle Forms PL/SQL Analyst ProgrammerQLD
- FTIT Information Security AdvisorNSW
- TPBusiness Process Analyst (Newcaslte Based)NSW
- CCSenior Business Analyst - AgileQLD
- TPMobile DeveloperWA
- CCFirewall EngineerNSW
- CCSenior Networks Specialist - DNS PlatformVIC
- TPScrum MasterVIC
- CCSOA Oracle DeveloperNSW
- FTDynamics AX Functional Consultant (Manufacturing and Trade & Logistics Modules)VIC
- TPOrganisational Change Manager - ICT Services TransformationQLD
- TPAgile Project Manager. Sharepoint / PeoplesoftNSW
- CCCommercial Contract AdministratorACT