BitTorrent dismissed claims that its popular peer-to-peer file synchronization program BitTorrent Sync has an insecure cryptographic implementation that potentially gives the company access to users' files.
Ramping up efforts to keep its customers' messages safe from snooping, WhatsApp said Tuesday that it now supports end-to-end encryption for messages sent between users.
A new organization supported by Mozilla, the Electronic Frontier Foundation and others is working to set up a new certificate authority (CA) that will provide website owners with free SSL/TLS certificates.
A consortium that develops guidelines for protecting payment card data is hoping that emerging security technologies will help prevent breaches that made this year one of the worst ever on the security front.
Cybercriminals behind a new ransomware program called CoinVault are trying out a new psychological tactic to convince users to pay up -- freebies.
Microsoft fixed a critical vulnerability Tuesday in the Windows cryptographic library that could expose Windows servers to remote code execution attacks. The update also adds support for stronger and more modern cryptographic ciphers to older Windows...
Certificate authority DigiCert is considering issuing SSL certificates to more Tor .onion address owners after recently providing Facebook with one.
Google released a tool that can be used to test whether the SSL/TLS encrypted connections opened by applications or devices are vulnerable to man-in-the-middle attacks.
Some of the most widely used messaging apps in the world, including Google Hangouts, Facebook chat, Yahoo Messenger and Snapchat, flunked a best-practices security test by advocacy group the Electronic Frontier Foundation (EFF).
Google plans to remove support for the aging Secure Sockets Layer (SSL) version 3.0 protocol in Google Chrome 40, which is expected to ship in about two months.
Facebook has made its site directly available on Tor to prevent access problems for people using the anonymity network and to provide an alternative method of accessing the social network securely.
Encrypting data traffic is mandatory for safeguarding information. But when attackers use encryption to mask their activity, it can be hard for enterprises to figure out what they're stealing.
A new technique that allows attackers to hide encrypted malicious Android applications inside images could be used to evade detection by antivirus products and possibly Google Play's own malware scanner.
Apple and Google should reconsider their plans to enable encryption by default on their smartphones, and the U.S. Congress should pass a law requiring that all communication tools allow police access to user data, U.S. FBI Director James Comey said.
Google researchers have found a severe flaw in an obsolete but still used encryption software, which could be exploited to steal sensitive data.
Gadgets & Things
Most Popular Reviews
- 1 Finally! LG OLED TV 2016 range review
- 2 Huawei Nova Plus smartphone review
- 3 Apple iPhone 7 Plus review: including Portrait Mode
- 4 Google Daydream View VR full, in-depth review
- 5 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
Join the PC World newsletter!
Latest News Articles
- Toshiba considers spinning off its memory business
- Time to ditch Foxtel and the iQ3: How to replace Foxtel packages with cheaper alternatives
- WikiLeaks’ Assange confident of winning 'any fair trial' in the US
- FTC charges Qualcomm with anticompetitive chip tactics
- Can a DDoS attack on Whitehouse.gov be a valid protest?
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- The top 10 best and worst tech gadgets and products of 2016
- TV of the year award 2016
- Best phone of the year 2016
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- FTBrand Marketing Manager - Premium Entertainment BrandNSW
- FTSenior System AdministratorVIC
- CCWeb Architect - Ruby, Python, Java, Open sourceNSW
- FTTSM SpecialistNSW
- TPFinancial Project management - Multiple grant programsNSW
- TPProgram ManagerNSW
- CCProgram Support OfficerNSW
- FTLife/400 Developers / Programmers - Permanent - North Ryde areaNSW
- CCJava Developer/ Guidewire Developers - Brisbane basedVIC
- CCIT Risk Specialist (Assurance) - TelcoVIC
- TPBI Report Developer - SSRS SSIS SSASNSW
- FTEnterprise Sales ManagerNSW
- FTTrading Systems EngineerNSW
- CCFIS Connex DeveloperQLD
- CCVirtualization ArchitectACT
- CCSenior Full-stack .Net DeveloperNSW
- FTERP Support ConsultantQLD
- CCMaster Planner /SchedulerQLD
- FTIT Field EngineerNSW
- CCSenior Solution ArchitectVIC
- FTSalesforce Technical Business AnalystQLD
- FTInfrastructure Project ManagerNSW
- TPLevel 3 Systems EngineerWA
- TPInfrastructure ArchitectVIC
- CCSenior C++ Software EngineerACT