Attackers can infect MacBook computers with highly persistent boot rootkits by connecting malicious devices to them over the Thunderbolt interface.
A new computer Trojan based on the infamous ZeuS banking malware is targeting users of over 150 banks and payment systems from around the world, security researchers warn.
Internet Explorer and Exchange Server top the list of Microsoft programs needing to be patched by IT administrators this month, now that the company has rolled out its latest round of "Patch Tuesday" security fixes.
Facebook has partnered with antivirus firm ESET to offer users the ability to scan their computers for malware directly from inside the social networking site.
Antivirus firm Bitdefender unveiled a hardware security appliance for home networks Tuesday that aims to protect devices by scanning network traffic to detect and block potential security threats.
A free tool released Thursday allows users to scan their computers for surveillance malware that has been used in attacks against journalists, human rights defenders and political activists around the world.
"Where's Andrea?" That was the question on the lips of attendees at this week's No Such Con security conference.
Cybercriminals behind a new ransomware program called CoinVault are trying out a new psychological tactic to convince users to pay up -- freebies.
AV vendors, in fierce competition for users, should remember that cooperation is key in fighting malware, a top Microsoft security official said Friday.
Adobe Systems released critical security updates Tuesday for Flash Player to address 18 vulnerabilities, many of which can be remotely exploited to compromise underlying systems.
Microsoft's Enhanced Mitigation Experience Toolkit (EMET), a security program popular with companies, was updated Monday to harden the exploit mitigations that it adds to other programs and to address compatibility issues with some of them.
If you haven't updated your Flash Player with the fixes released on Oct. 14, you may be vulnerable to new attacks using a commercial exploit kit called Fiesta, security researchers warn.
Yahoo said Monday it has fixed a bug that was mistaken for the Shellshock flaw, but no user data was affected.
In a gambit aimed at driving manufacturers to beef up protections for USB flash drive firmware, two security researchers have released a collection of tools that can be used to turn those drives into silent malware installers.
The breach of Home Depot's payment systems may have compromised 56 million payment cards as a result of malware that has since been eliminated, the company said Thursday.
Most Popular Reviews
- 1 Samsung Galaxy Note 7 review
- 2 Portable power: Venom Blackbook 13 Zero review
- 3 Alcatel Idol 4S review: King of the mid-range?
- 4 Witness a 241% Australian price hike: Dell Latitude 7370 review
- 5 Is this the best value phone on the market? Moto G4 Plus review
Join the PC World newsletter!
Latest News Articles
- Okta's API access product targets the trend toward services
- Say hello to old friend Dell Technologies on Sept. 7
- DARPA sees IoT and AI as weapons to dominate wars
- BitTorrent client is found distributing Mac-based malware
- Get started in data science: 5 steps you can take online for free
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCDesktop Support Level 1 /2VIC
- FTData AnalystsWA
- CCTechnical Business Analyst- BABOK,Infrastructure, Banking bkgndNSW
- CCInfra & Application Specialist/ Devops SpecialistNSW
- CCDeployment CoordinatorNSW
- CCSenior Server and Storage Support EngineerNSW
- CCBusiness Analyst - Project Server/SharePoint exposureACT
- CCSenior Business Analyst - GeneralVIC
- CCProject Manager - open source softwareACT
- FTStorage EngineerSA
- FTSenior Full Stack .Net Developer - Brand NEW IoT ProjectNSW
- CCContract Analyst Programmer (JBoss/J2EE/SQL) 160830/AP/193Asia
- CCContract Programmer (JAVA/J2EE) 160901/P/601Asia
- FTUNIX, LINUX , VM System AdministrationNSW
- CCContract Analyst Programmer (JAVA/Unix/Linux/Web) 160819/AP/173Asia
- CCContract Analyst Programmer (.NET/SQL Server) 160829/AP/267Asia
- CCSenior Project Specialist - Network IPVIC
- CCSAP IS Retail Functional LeadVIC
- CCFacilities ManagerACT
- CCFull stack Java Developer- NoSQL database, Amazon AWS productsNSW
- FTOrchestration Engineer - DevOps - PuppetVIC
- CCChange ManagerNSW
- CCTest Environment ManagerNSW
- CCNetwork Technology SpecialistVIC
- CCProgram SchedulerVIC