The hacking group that targeted unclassified email systems at the U.S. Department of State and the White House is believed to have also compromised a network used by the Joint Chiefs of Staff, a body of senior U.S. military leaders.
The U.S. National Security Agency will lose access to the bulk telephone records data it has collected at the end of November, the Office of the Director of National Intelligence announced Monday.
Someone call the malware antitrust commission: Recent versions of the Kovter ad fraud Trojan, which infects computers through Web-based exploits, close the door after themselves by updating Flash Player to the latest version.
Cisco Systems plans to pay $US635 million in cash to buy OpenDNS, a company that leverages the Domain Name System (DNS) to provide security services including Web filtering, threat intelligence and malware and phishing protection.
Windows 10 will have a new mechanism that will allow software developers to integrate their applications with whatever antimalware programs exist on users' computers.
The shamelessness of ransomware pushers knows no bounds. After encrypting people's files and then holding them to ransom, they portray themselves as service providers offering technical support and discounts to their "customers."
The U.S. House of Representatives may vote on a controversial cyberthreat information sharing bill this week, despite major privacy concerns from many digital rights groups and security researchers.
Security researchers who participated in the Pwn2Own hacking contest this week demonstrated remote code execution exploits against the top four browsers, and also hacked the widely used Adobe Reader and Flash Player plug-ins.
Microsoft updated its Enhanced Mitigation Experience Toolkit (EMET), a free exploit prevention tool, to protect against attacks that attempt to bypass Internet Explorer's sandbox using VBScript.
A cryptographic library used in all Windows versions is affected by a recently disclosed vulnerability in SSL/TLS implementations that allows man-in-the-middle attackers to force clients and servers to use weak encryption. Internet Explorer and other...
An effort to search for cryptographic flaws in TrueCrypt, a popular disk encryption program, will resume even though the software was abandoned by its creators almost a year ago.
Jeb Bush, the former Florida governor now contemplating a run for U.S. president, may not have privacy high on his agenda.
The Twitter accounts of two more companies -- Newsweek and the International Business Times -- were compromised on Tuesday, showing Twitter's attractiveness to hackers despite its cybersecurity features.
Pro tip for any would-be online drug kingpins: Don't post vacation pictures on Facebook.
CryptoWall, one of a family of malware programs that encrypts files and demands a ransom from victims, has undergone a revamp that is frustrating security researchers.
Most Popular Reviews
- 1 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
- 2 Sony Xperia XZ review: turbo-charged last-gen phone
- 3 Sony X9300D and X8500D UHD 4K TV review
- 4 Hisense Series 7 ULED 4K UHD TV review
- 5 Moto X Force review: Leading features from a mid-range phone
Join the PC World newsletter!
Latest News Articles
- Apple sales, profits fall again but a brighter outlook ahead
- AWS quietly launches tool for migrating on-premesis apps to the cloud
- Intel wants to make its IoT chips see, think, and act
- Workstation software flaw exposes industrial control systems to hacking
- Critical account creation flaws patched in popular Joomla CMS
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- Google Pixel XL full, in-depth smartphone review: The new best Android phone
- Japan Robot, gadget and car expo slideshow
- Panasonic DX900U UHD 4K smart TV review: Best all-round TV ever?
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- FTMicrosoft Dynamics AX Technical ArchitectVIC
- CCBusiness Intelligence - DeveloperACT
- CCUnix Project LeadNSW
- FTSenior Network Engineer JUNIPERNSW
- FTBusiness Analyst - PIMAsia
- CCSenior Siebel Business AnalystACT
- FTMicrosoft Dynamics AX Finance ConsultantACT
- FTData Governance Project Manager | 6 month ContractNSW
- CCICT Business AnalystACT
- FTBusiness Analyst - HKMAAsia
- CCDefence Opportunities - Baseline, NV1 or NV2SA
- CCSenior Business Analyst, Margin ProjectsNSW
- CCAnalyst Programmer (12-month renewable Contract)Asia
- CCBase24 DeveloperNSW
- TPSoftware EngineerWA
- CCContract Analyst Programmer (Java/J2EE/MyEclipse) 161007/AP/vmpAsia
- TPBusiness Systems AnalystQLD
- CCInfrastructure Specialist :SCOMWA
- FTSolution Architect - Application IntegrationQLD
- FTGraduate Software Consultant - SQL Server programming skillsACT
- FTMicrosoft Dynamics AX Technical ArchitectACT
- FTIT Systems ManagerNSW
- CCSenior / Lead UX DesignerNSW
- FTMULTIPLE PERM PROJECT MANAGERSACT
- FT.Net DeveloperVIC