Mozilla has dusted off some decommissioned servers and networking gear and used them to set up high-speed relays on the Tor anonymity network.
A new Chrome extension highlights tools embedded in websites that could pose privacy risks by sending data unencrypted over the Internet.
A U.S. agency that develops widely used standards for encryption has pledged to be more transparent about its dealings with the National Security Agency, amid concerns the NSA undermined those standards to boost its surveillance efforts.
Mega has opened beta testing for a new encrypted video calling service that integrates with its existing file hosting and sharing offerings.
Attackers have started distributing a new and improved version of the CryptoWall file-encrypting ransomware program over the past few days, security researchers warn.
The U.K. may ban online messaging services that offer encryption such as WhatsApp and Apple's iMessage, under surveillance plans laid out by Prime Minister David Cameron.
Server administrators are advised to upgrade OpenSSL again to fix eight new vulnerabilities, two of which can lead to denial-of-service (DoS) attacks.
In-flight Internet provider Gogo is inspecting its users' traffic exchanged with secure sites by replacing those sites' HTTPS certificates with self-signed ones.
A new open-source tool can be used to launch phishing attacks against users of wireless networks in order to steal their Wi-Fi access keys.
Three out of three? That could be the score for the U.S. National Security Agency's cryptographic "most wanted" list of 2012.
Google is making progress developing a user-friendly tool for fully encrypting people's messages on their computers, with coding help from Yahoo and a transition to GitHub.
Subdomains that once served a purpose but later were forgotten by website administrators can be abused by hackers to attack users of sites under the same main domain.
Webmasters who patched their sites against a serious SSL flaw discovered in October will have to check them again. Researchers have discovered that the vulnerability also affects implementations of the newer TLS (Transport Layer Security) protocol.
BlackBerry is now free to integrate German security vendor Secusmart's voice encryption technology on its smartphones and software, after the German government approved its acquisition of the company.
"Where's Andrea?" That was the question on the lips of attendees at this week's No Such Con security conference.
Gadgets & Things
Most Popular Reviews
- 1 Finally! LG OLED TV 2016 range review
- 2 Google Daydream View VR full, in-depth review
- 3 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
- 4 Apple iPhone 7 Plus review: including Portrait Mode
- 5 MSI GS70 laptop review
Join the PC World newsletter!
Latest News Articles
- Intel, Microsoft going long distance with Cortana on Windows 10 PCs
- Obama orders review of election hacks as Trump doubts Russia's role
- Ransomware attacks against businesses increased threefold in 2016
- Attackers use hacked home routers to hit Russia's 5 largest banks
- US mulls rules for airlines that plan in-flight Wi-Fi voice calls
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- The top 10 best and worst tech gadgets and products of 2016
- TV of the year award 2016
- Best phone of the year 2016
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- FTProject Manager (Cyber Security) - Permanent - IT Services - North Ryde areaNSW
- CCProject Manager - Cabling, Network Sys Design and DeliveryNSW
- FTChief Security Officer l CISSP l ISO27001NSW
- FTPortal Project ManagerNSW
- TPFull Stack .NET DeveloperWA
- CCSenior Windows Automation Specialist (Integration)VIC
- TP.NET Developer (Sitecore)QLD
- FTCommercial, Contract, Vendor ManagementVIC
- CCLotus Notes DeveloperNSW
- FTSenior Project CoordinatorNSW
- CCCX Performance & Insights AnalystNSW
- CCNetwork Deployment SpecialistNSW
- CCTeam Lead / Senior Software Engineer - C/C++ / Web ServicesNSW
- CCIteration Manager / Scrum MasterVIC
- CCSenior Performance Test AnalystSA
- TPSenior PMO AnalystNSW
- CCSuperannuation Research ConsultantACT
- CCAPI DeveloperSA
- TPSenior Business AnalystQLD
- TPBusiness Objects DeveloperNSW
- CCMainframe Developer (with ASP.NET)NSW
- TPProject CoordinatorNSW
- CCChange Manager (Office365) required for leading digital innovator in SydneyNSW
- FTSenior Reporting Data Analyst - TelcoVIC
- CCSystems AdministratorQLD