A new type of malware resorts to crippling a computer if it is detected during security checks, a particularly catastrophic blow to its victims.
EMC's VCE division wants to take the engineered systems approach it's honed with its Vblocks into next-generation mobile and cloud applications.
Cisco Systems has appointed Chuck Robbins, the company's senior vice president of worldwide operations, as CEO, replacing long-time chief executive John Chambers.
Some users whose computers have been infected with a ransomware program called TeslaCrypt might be in luck: security researchers from Cisco Systems have developed a tool to recover their encrypted files.
Obama authorizes sanctions for hackers... Facebook Riffs on video apps... Uber takes its fight to Brussels... and more tech news
Cisco plans to beef up its SDN [software-defined networking] technology by acquiring Embrane, a startup with an architecture for virtualized network appliances.
Cisco Systems released firmware updates for several routers and switches that run its IOS and IOS XE software in order to fix flaws in their autonomic networking infrastructure (ANI) feature.
The Internet of Things is mostly about achieving greater scale, but in the case of an upcoming demonstration project, it will show how electrical grids can work at a smaller scale.
Retailers beware: A new Trojan program targets point-of-sale (PoS) terminals, stealing payment card data that can then be abused by cybercriminals.
EMC pools assets into data lakes...U.S. bill aims at ed tech companies...leaked FTC report could free EC to act on Google... and more tech news
You don't need to be the NSA to tap calls on Cisco's SPA 300 and 500 IP phones: An authentication flaw allows potential attackers to do that by default.
Bare-metal switches that can be programmed like Linux servers aren't just for big Web companies anymore. They may show up in a lot more average enterprises in the next few years.
One of the most successful U.S. National Security Agency spying programs involved intercepting IT equipment en route to customers and modifying it.
Networking hardware and spontaneous applause don't often go together, but Facebook's Omar Baldonado set off a round of cheering this week when he told engineers there's finally an open-source hardware design that they can use to build switches.
Hundreds of hacked domain name accounts registered through GoDaddy are being used as part of a highly effective campaign using the Angler exploit kit to infect computers with malware.
Most Popular Reviews
- 1 Sony Xperia Z4 Tablet (LTE) review: The tablet of choice for anyone on Android
- 2 Bose SoundLink Mini II Bluetooth speaker review
- 3 Apple MacBook Air 2015 review: Only better with time
- 4 HTC One (M8s) review: Better value for money than HTC's flagship
- 5 ZTE Blade S6 review: A dual-SIM, 4G smartphone for less than $300
Join the PC World newsletter!
Deals on PC World
- Networking, Wireless & VoIP
Deals on PC World
Latest News Articles
- GoPro Hero4 Session: half the size and waterproof to 10 metres
- The Upload: Your tech news briefing for Monday, July 6
- Leak of ZeusVM malware building tool might cause botnet surge
- Giant mecha robots from Japan, US will meet in epic battle
- Italian surveillance software maker, Hacking Team, allegedly breached
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.