The U.S. Army warned Thursday that databases holding information on 16,000 South Korean civilian employees of the U.S. military and applicants for base jobs may have been compromised.
Encryption is like a relationship -- both parties need to be on the same page for it to work. And Microsoft and Comcast are apparently not on Google's page.
A U.S. House of Representatives committee has reportedly launched an investigation into the Federal Trade Commission's use of information from a peer-to-peer security vendor to bring a data breach complaint against a medical testing laboratory.
Someday, if you use your non-dominant hand to control your mouse or touchpad when you're say, shopping online, websites might interpret your irregular scrolling and clicking as a sign of fraud and require you to prove your identity, thanks to an IBM ...
Like a crowbar, security software tools can be used for good and evil.
A suspected Iranian hacker group seeded Facebook and LinkedIn with bogus profiles of attractive women and even created a fake online news organization to get digitally closer to more than 2,000 people whom it wanted to spy on.
eBay's security team isn't going to get a break for a while.
A security researcher who found a major vulnerability in eBay's website last week said a second flaw he found hasn't been fixed and could be used to hijack user accounts.
Prague-based antivirus company, Avast, said, on Monday, it took its community forum offline after a data breach, but payment information was not compromised.
Security researchers uncovered a global cybercriminal operation that infected with malware almost 1,500 point-of-sale (POS) terminals, accounting systems and other retail back-office platforms from businesses in 36 countries.
A third of data breaches investigated by security firm Trustwave last year involved compromises of point-of-sale (PoS) systems and over half of all intrusions targeted payment card data.
The U.S. Department of Justice's decision to bring computer hacking and economic espionage charges against five alleged members of the Chinese army is an attempt by President Barack Obama's administration to redirect a global discussion about cyberha...
Some of the biggest U.S. retailers have banded together to share information about cyberthreats, in a bid to avert breaches like that suffered by Target last holiday season.
Despite taking prompt action to defend against the Heartbleed attack, some sites are no better off than before -- and in some cases, they are much worse off.
Gadgets & Things
Most Popular Reviews
- 1 Finally! LG OLED TV 2016 range review
- 2 Huawei Nova Plus smartphone review
- 3 Apple iPhone 7 Plus review: including Portrait Mode
- 4 Google Daydream View VR full, in-depth review
- 5 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
Join the PC World newsletter!
Latest News Articles
- Lavabit developer has a new encrypted, end-to-end email protocol
- Apple sues Qualcomm over patent licensing and $1B in payments
- New details emerge about Intel's super-small Euclid computer for robots
- Microsoft will soon end Office 2013 distribution through Office 365
- Researchers propose a way to use your heartbeat as a password
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- Time to ditch Foxtel and the iQ3: How to replace Foxtel packages with cheaper alternatives
- The top 10 best and worst tech gadgets and products of 2016
- TV of the year award 2016
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- FTBrand Marketing Manager - Premium Entertainment BrandNSW
- TPSenior Business Analyst - Travel and Expense Management SystemQLD
- FTLevel 3 EngineerNSW
- FTLevel 3 EngineerNSW
- TPMS Dynamics Post Implementation BAQLD
- CCProject/ Operational CoordinatorNSW
- CCReporting AnalystVIC
- FTSenior System AdministratorVIC
- FTSolutions Architect - Data Centre/ NetworkNSW
- TPPL/SQL DeveloperNSW
- TPChange ManagerNSW
- FTSnr SOC Security Coordinator - Perm - North Ryde areaNSW
- TPSenior PMO AnalystNSW
- CCVirtualization ArchitectACT
- FTC ProgrammerACT
- FTTechnical Business AnalystVIC
- CCSenior Applications Project Manager - Office 365QLD
- FTSolutions Architect - Data Centre/ NetworkSA
- FTFront End DeveloperVIC
- FTJava DeveloperSA
- FTSystem AdministratorNSW
- TPBusiness Objects DeveloperNSW
- FTIT Information Security AdvisorNSW
- FTChange AnalystVIC
- FTSenior Drupal DeveloperNSW