BitTorrent dismissed claims that its popular peer-to-peer file synchronization program BitTorrent Sync has an insecure cryptographic implementation that potentially gives the company access to users' files.
Ramping up efforts to keep its customers' messages safe from snooping, WhatsApp said Tuesday that it now supports end-to-end encryption for messages sent between users.
A new organization supported by Mozilla, the Electronic Frontier Foundation and others is working to set up a new certificate authority (CA) that will provide website owners with free SSL/TLS certificates.
A consortium that develops guidelines for protecting payment card data is hoping that emerging security technologies will help prevent breaches that made this year one of the worst ever on the security front.
Cybercriminals behind a new ransomware program called CoinVault are trying out a new psychological tactic to convince users to pay up -- freebies.
Microsoft fixed a critical vulnerability Tuesday in the Windows cryptographic library that could expose Windows servers to remote code execution attacks. The update also adds support for stronger and more modern cryptographic ciphers to older Windows...
Certificate authority DigiCert is considering issuing SSL certificates to more Tor .onion address owners after recently providing Facebook with one.
Google released a tool that can be used to test whether the SSL/TLS encrypted connections opened by applications or devices are vulnerable to man-in-the-middle attacks.
Some of the most widely used messaging apps in the world, including Google Hangouts, Facebook chat, Yahoo Messenger and Snapchat, flunked a best-practices security test by advocacy group the Electronic Frontier Foundation (EFF).
Google plans to remove support for the aging Secure Sockets Layer (SSL) version 3.0 protocol in Google Chrome 40, which is expected to ship in about two months.
Facebook has made its site directly available on Tor to prevent access problems for people using the anonymity network and to provide an alternative method of accessing the social network securely.
Encrypting data traffic is mandatory for safeguarding information. But when attackers use encryption to mask their activity, it can be hard for enterprises to figure out what they're stealing.
A new technique that allows attackers to hide encrypted malicious Android applications inside images could be used to evade detection by antivirus products and possibly Google Play's own malware scanner.
Apple and Google should reconsider their plans to enable encryption by default on their smartphones, and the U.S. Congress should pass a law requiring that all communication tools allow police access to user data, U.S. FBI Director James Comey said.
Google researchers have found a severe flaw in an obsolete but still used encryption software, which could be exploited to steal sensitive data.
Most Popular Reviews
- 1 Samsung Galaxy Note 7 review
- 2 Portable power: Venom Blackbook 13 Zero review
- 3 Alcatel Idol 4S review: King of the mid-range?
- 4 Witness a 241% Australian price hike: Dell Latitude 7370 review
- 5 Is this the best value phone on the market? Moto G4 Plus review
Join the PC World newsletter!
Latest News Articles
- Medical device security ignites an ethics firestorm
- Got big data? Check out these 100 best practices for keeping it secure
- Mozilla launches free website security scanning service
- Privacy Shield data transfer agreement now shelters 200 companies
- Dropbox prompts certain users to change their passwords
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCSenior Project Manager, Cyber Security TransformationNSW
- FTUNIX, LINUX , VM System AdministrationNSW
- CCSenior Business Analyst - TaxVIC
- CCSenior Project ManagerNSW
- CCDevOps Engineer - Php, LAMP, XML, scripting, JavaNSW
- CCSolution Architect - Data MigrationVIC
- CCSenior Change Analyst, WealthNSW
- FTIT Manager - Infrastructure Strategy and OperationsNSW
- CCSenior Java DeveloperVIC
- CCStorage / Server EngineerNSW
- CCJava / J2ee ProgrammersACT
- CCEnterprise ArchitectNSW
- CCEmail Production SpecialistNSW
- CCJunior/Intermediate Drupal web developer - APS Level 4/5 equiACT
- CCSenior Technology Specialist - Back-end Java/JEENSW
- CCSalesforce CRM ManagerNSW
- CCSAP Program Manager - CBDNSW
- FTSenior Full Stack .Net DeveloperNSW
- CCProject Coordinator (Paying $400-$450 per day)NSW
- CCImplementation ManagerVIC
- CCEnterprise Architect ? Big Data AnalyticsNSW
- FTSenior Business AnalystVIC
- CCComms project specialistVIC
- CCSenior Project Manager - TelecommunicationVIC
- FTSenior Full Stack .Net Developer - Brand NEW IoT ProjectNSW