They spread lies. They push products you don't care about. They make unpopular people look popular. Sometimes, they take over your machine with malware.
Cybercriminals stole debit card information from customers of dozens of financial institutions in a phishing campaign that combined rogue text messages and with VoIP calls.
When's the last time you thought about using different passwords for different websites? Perhaps after a bug called Heartbleed started crawling around them.
Web application attacks, cyber-espionage and point-of-sale intrusions were among the top IT security threats in 2013, according to Verizon's latest annual report on data breach investigations.
About 2.6 million payment cards at Michaels Stores and another 400,000 at subsidiary Aaron Brothers may have been affected in a card skimming attack that compromised its point-of-sale systems, the retailer said Thursday.
Canadian police have arrested a 19-year-old man for allegedly using the Heartbleed bug to steal data about taxpayers.
Four researchers working separately have demonstrated a server's private encryption key can be obtained using the Heartbleed bug, an attack thought possible but unconfirmed.
The Identity Theft Resource Center, which tracks data breaches, has counted 204 of them from January 1 to March 27.
A 5-year-old San Diego boy has been commended by Microsoft for his security skills after finding a vulnerability in the company's Xbox games console.
A group of state attorneys general in the U.S. is launching an investigation into a recently disclosed data breach of 200 million personal records at a subsidiary of credit monitoring firm Experian.
In an attempt at clarity, Google has amended its terms of service to say that it analyzes private data, including emails, for purposes including the delivery of ads and customized search results.
A botnet that was slowly shrinking has taken on a new trick: brute-forcing routers set to easy-to-guess credentials.
Yahoo said Wednesday it was encrypting traffic flowing between its data centers, several months after leaked documents revealed the government had been sniffing those links.
Smaller financial institutions have been warned to look out for attacks that aim to increase the withdrawal limit on customer payment cards for fraud purposes.
Many companies have felt the effects of data theft over the last several years. It's 2014 and it doesn't look like the going is getting any easier. The technology sector seems most at risk with every week bringing the world another reported data brea...
Most Popular Reviews
- 1 Witness a 241% Australian price hike: Dell Latitude 7370 review
- 2 Is this the best value phone on the market? Moto G4 Plus review
- 3 Sony Xperia X Performance review: Sony’s most disappointing product in years
- 4 Huawei P9 review: lifting photography to another level... sometimes.
- 5 Huawei Mate 8 review: probably the best all-round Android phone you can buy
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- Xiaomi gets into laptops with Mi Notebook Air
- IDG Pokémon Go bible
- Qualcomm agrees to pay $19.5M to settle charges of bias against women
- In light of increased cyberattacks, White House sets defence plan with FBI in charge
- The best Pokémon Go map grabs data directly from the Pokémon Go servers
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTSocial Media AssistantQLD
- CCNetwork Engineer - NV2 ClearanceVIC
- FTSAP PI ABAP SpecialistVIC
- CCChange Analysts - multiple rolesNSW
- FTDefence Network Architect | NV2ACT
- CCFull Stack Java DeveloperNSW
- CCBusiness Intelligence Developer - Initial 3mth ContractVIC
- CCBusiness Project ManagerVIC
- CCAgile Scrum MasterACT
- FTPortal DeveloperNSW
- FTProject Manager- Change ManagementSA
- CCSystems AdministratorSA
- FTProject CoordinatorQLD
- CCStrategic Business AnalystNSW
- CCOracle Apex DeveloperWA
- CCPortfolio ManagerVIC
- CCServiceNow Technical LeadNSW
- FTMidrange Server Provision SMENSW
- CCEnvironment Support AnalystQLD
- CCContract Programmer (JAVA/J2EE/SQL/Web) 160719/P/741Asia
- CCSolution Architect - Supply ChainNSW
- FTDesktop EngineerNSW
- CCSenior Agile Java/Spring/AngularJS EngineerNSW
- CCSenior Business Systems AnalystVIC
- CCSenior Data ArchitectNSW