They spread lies. They push products you don't care about. They make unpopular people look popular. Sometimes, they take over your machine with malware.
Cybercriminals stole debit card information from customers of dozens of financial institutions in a phishing campaign that combined rogue text messages and with VoIP calls.
When's the last time you thought about using different passwords for different websites? Perhaps after a bug called Heartbleed started crawling around them.
Web application attacks, cyber-espionage and point-of-sale intrusions were among the top IT security threats in 2013, according to Verizon's latest annual report on data breach investigations.
About 2.6 million payment cards at Michaels Stores and another 400,000 at subsidiary Aaron Brothers may have been affected in a card skimming attack that compromised its point-of-sale systems, the retailer said Thursday.
Canadian police have arrested a 19-year-old man for allegedly using the Heartbleed bug to steal data about taxpayers.
Four researchers working separately have demonstrated a server's private encryption key can be obtained using the Heartbleed bug, an attack thought possible but unconfirmed.
The Identity Theft Resource Center, which tracks data breaches, has counted 204 of them from January 1 to March 27.
A 5-year-old San Diego boy has been commended by Microsoft for his security skills after finding a vulnerability in the company's Xbox games console.
A group of state attorneys general in the U.S. is launching an investigation into a recently disclosed data breach of 200 million personal records at a subsidiary of credit monitoring firm Experian.
In an attempt at clarity, Google has amended its terms of service to say that it analyzes private data, including emails, for purposes including the delivery of ads and customized search results.
A botnet that was slowly shrinking has taken on a new trick: brute-forcing routers set to easy-to-guess credentials.
Yahoo said Wednesday it was encrypting traffic flowing between its data centers, several months after leaked documents revealed the government had been sniffing those links.
Smaller financial institutions have been warned to look out for attacks that aim to increase the withdrawal limit on customer payment cards for fraud purposes.
Many companies have felt the effects of data theft over the last several years. It's 2014 and it doesn't look like the going is getting any easier. The technology sector seems most at risk with every week bringing the world another reported data brea...
Gadgets & Things
Most Popular Reviews
- 1 Finally! LG OLED TV 2016 range review
- 2 Google Daydream View VR full, in-depth review
- 3 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
- 4 Apple iPhone 7 Plus review: including Portrait Mode
- 5 MSI GS70 laptop review
Join the PC World newsletter!
Latest News Articles
- Apple offers views on automated car policy, but cagey about its plans
- Watch Dogs 2 review: A fresh, interesting rebirth that ditches the stale Ubisoft formula
- How to shoot a drone out of the sky
- Microsoft's "Holoportation" will virtually beam you into another room
- Russia claims it foiled a cyber attack from a foreign spy service
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- TV of the year award 2016
- Best phone of the year 2016
- Google Daydream View VR full, in-depth review
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- CCIteration Manager / Scrum MasterOther
- CCEnterprise Solution ArchitectNSW
- TPProject Coordinator. Business Process Improvement ProgramNSW
- TPFrontend DeveloperNSW
- CCProject CoordinatorNSW
- CCSenior Software Engineer - C/C++NSW
- CCBusiness AnalystNSW
- CCProject Manager - Procurement System ImplementationACT
- FTWeb Developer/ DesignerWA
- CCProject ManagerNSW
- FTSenior Manager, Data and InformationQLD
- CCGIS ConsultantQLD
- FTSenior .Net DeveloperVIC
- CCHadoop Developer - Big DataNSW
- CCProject Manager/Scrum MasterNSW
- FTSenior Project Manager / Program ManagerNSW
- CCProject Manager- Office 365 and Core Azure servicesNSW
- TPProjects Planning ManagerQLD
- CCSenior Front End DeveloperSA
- CCApplication Blueprinting Engineer ( Developer).ACT
- CCTest Lead : Perth BasedNSW
- FTDevOps EngineerQLD
- CCWeb Developer - WordpressNSW
- FTSolution Architect with end user (EUC) computing experienceNSW
- CCProject Manager :ApplicationsWA