Security researchers and hackers gathered in Las Vegas over the past week to show off and learn about the latest vulnerabilities that affect devices and software that the world relies on every day. Black Hat and DEF CON, the world's top security conf...
With their own dedicated processor and operating system, LTE/3G modems built into new business laptops and tablets could be a valuable target for hackers by providing a stealthy way to maintain persistent access to an infected device.
A talk about a radio-based privacy device dubbed ProxyHam that promised to allow hackers to connect to Wi-Fi networks from as far as 2.5 miles away was abruptly pulled from the DEF CON schedule by its creator a few weeks ago.
Dropcam, the popular video monitoring camera, bills itself as "super simple security." But a pair of researchers plan to show at the Defcon hacking conference later this week how having a Dropcam could get a lot more complicated.
LAS VEGAS -- Botnets and their masters can communicate with each other by calling into the same VoIP conference call and swapping data using touch tones, researchers demonstrated at Defcon.
LAS VEGAS -- Anonymous has run up quite a score against corporations, governments and law enforcement agencies, but for all these warnings corporate executives are turning their heads from the real problem -- their network security is terrible, a pan...
Among the thousands of security experts at the Black Hat, Defcon and Security BSides conferences next week in Las Vegas, some will surely test whether they can break into nearby laptops, phones, networks -- even RFID-enabled room keys and credit card...
NEW YORK -- Social networks are a major resource for hackers trying to capture valuable corporate data or run amok inside business networks, the information security director of a major online trading firm told Security Standard attendees.
Of the 135 people Fortune 500 employees targeted by social engineering hackers in a recent contest only five of them refused to give up any corporate information whatsoever. And guess what? All five were women.
A secretive volunteer group that tries to track terrorists and criminals on the Internet went to the Defcon hacker conference this past week in hopes of recruiting information security experts, but it will first have to overcome some skepticism.
A few companies in the Fortune 500 need to upgrade their Web browsers. And while they're at it, a little in-house training on social engineering wouldn't be a bad idea, either.
It's one of the best things about the Defcon hacking conference, and one of its most closely guarded secrets: the programmable badge that's handed out to show attendees every year.
Hoping to understand what a new generation of mobile malware could resemble, security researchers will demonstrate a malicious "rootkit" program they've written for Google's Android phone next month at the Defcon hacking conference in Las Vegas.
Four South Korean journalists were booted from the Defcon hacking conference this week after conference organizers decided their story didn't quite add up.
The U.S. Air Force has found an unlikely source of new recruits: The yearly Defcon hacking conference, which runs Thursday through Sunday in Las Vegas.
Most Popular Reviews
- 1 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
- 2 Sony Xperia XZ review: turbo-charged last-gen phone
- 3 Hisense Series 7 ULED 4K UHD TV review
- 4 Sony X9300D and X8500D UHD 4K TV review
- 5 Moto X Force review: Leading features from a mid-range phone
Join the PC World newsletter!
Latest News Articles
- U.S. indicts Russian for hacking LinkedIn, Dropbox, Formspring
- An IoT botnet is partly behind Friday's massive DDOS attack
- Bankers plan to give Corda blockchain code to Hyperledger project
- Easy-to-exploit rooting flaw puts Linux computers at risk
- Intel asserts its trademark rights against John McAfee
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- Google Pixel XL full, in-depth smartphone review: The new best Android phone
- Japan Robot, gadget and car expo slideshow
- Panasonic DX900U UHD 4K smart TV review: Best all-round TV ever?
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- CCInformation Security Consultant - RSA ArcherNSW
- CCIT Data AnalystACT
- CCProgram ManagerACT
- FTSenior Front End DeveloperNSW
- CCSystem & Network EngineerVIC
- CCAnalyst Programmer (12-month renewable Contract)Asia
- CCContract Analyst Programmer (J2EE/Oracle/SQL) 161018/AP/812Asia
- CCContract Analyst Programmer (Java/J2EE/MyEclipse) 161007/AP/vmpAsia
- CCEnterprise ArchitectNSW
- CCWindows EngineerACT
- CCDemand ManagerNSW
- CCJava DeveloperNSW
- CCSAS DI DeveloperNSW
- CCContract Analyst Programmer (IT Security) 161018/AP/383Asia
- CCSenior Security EngineerNSW
- FTSenior UX DesignerAsia
- FTData AnalystNSW
- CC.Net Sitecore DeveloperVIC
- CCService Desk ConsultantTAS
- CCAnalyst Programmer (12-Month Renewable Contract)Asia
- FTSenior MS Dynamics CRM ConsultantSA
- CCContract IT Assistant (PC LAN Support) 161114/ITA/411Asia
- FTSenior Architect | Perl | Linux |MySQL | Infrastructure | TelecomNSW
- CCProject SchedulerVIC
- CCContract Senior Systems Analyst (J2EE/JAVA/Web) 161012/SSA/552Asia