Premera Blue Cross may have been attacked using the same methods employed against its fellow health insurer Anthem, suggesting that a single group may be behind both breaches.
Hundreds of Android and iOS apps are still vulnerable to a dangerous attack revealed two weeks ago that can compromise encrypted data, a security vendor said Tuesday.
Microsoft updated its Enhanced Mitigation Experience Toolkit (EMET), a free exploit prevention tool, to protect against attacks that attempt to bypass Internet Explorer's sandbox using VBScript.
New versions of OpenSSL will be released on Thursday to patch several security vulnerabilities, one of which is considered highly serious, according to the OpenSSL Project Team.
What if the key to your house was shared with 28,000 other homes?
The U.S. Department of State expects its main unclassified email system to be back in operation later Monday after security upgrades, but wider Internet access could take longer to get back online.
The U.S. Department of State will shut down its unclassified email system for a short time to clean up malware that may have resided there since late last year.
Over a million WordPress websites that use a popular plug-in to optimize their search engine results are at risk of being hacked if they don't apply a newly released patch.
Android apps that use Dropbox for storage and are built using an older version of its SDK are vulnerable to an attack that can steal data, although Dropbox has released a fix, according to IBM security researchers.
If you patched your Windows computers in 2010 against the LNK exploit used by Stuxnet and thought you were safe, researchers from Hewlett-Packard have some bad news for you: Microsoft's fix was flawed.
Researchers sponsored by the U.S. government have reportedly tried to defeat the encryption and security of Apple devices for years.
A new tool allows hackers to generate URLs that can hijack accounts on sites that use Facebook Login, potentially enabling powerful phishing attacks.
A collection of computer Trojans that have been used since 2009 to steal data from government agencies, military contractors, media organizations and other companies is tied to cyberespionage malware possibly created by French intelligence agencies.
A cryptographic library used in all Windows versions is affected by a recently disclosed vulnerability in SSL/TLS implementations that allows man-in-the-middle attackers to force clients and servers to use weak encryption. Internet Explorer and other...
Adobe Systems launched a new program that encourages security researchers to find and report vulnerabilities in the company's websites and other online services.
Most Popular Reviews
- 1 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 2 D-Link Taipan AC3200 Ultra tri-band modem-router review
- 3 Dell XPS 13 (2016) review: Making the very best Ultrabook
- 4 Microsoft Surface Book review: The verdict on Microsoft's first notebook
- 5 Telstra Wi-Fi 4GX Advanced III review: Testing the world's first 600Mbps wireless hotspot
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- If Tim Burton made a robot, this would be it
- Here's how NASCAR is digitizing race day
- Should Microsoft release a successor to Surface 3?
- Researchers steal data from a PC by controllng the noise from the fans
- The 'summer of AI' is here, this startup chief says
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTContract System SpecialistAsia
- CCContract Analyst Programmer (JAVA/J2EE/SQL) 160616/AP/185Asia
- CCSenior Performance & Automation EngineerNSW
- CCContract Junior Programmer (JAVA / SQL) 160621/JP/224Asia
- FTProject CoordinatorQLD
- FTSenior Software Developer (Full Stack)SA
- CCDigital Business AnalystVIC
- CCPMO AnalystVIC
- FTProject Coordinator / AdministratorNSW
- CCAnalyst Programmer (System Backup Operation/UNIX) 160615/AP/791Asia
- CCProgram Test ManagerNSW
- CCContract Analyst Programmer (JAVA/SQL) 160617/AP/623Asia
- CCProject Master SchedulerVIC
- FTNetwork Engineer | Canberra | NV1 NV2 clearance | Defence projectsNSW
- FTIT Support Analyst (Renewal Contract)Asia
- FTEnterprise Technology Platform ManagerVIC
- CCContract Programmer (JAVA/J2EE/SQL) 160628/P/133Asia
- CCBusiness Impact AssessmentsVIC
- CCProject Scheduler - IT Security ProgramNSW
- FTNV2 Defence Project Manager | Canberra | Major exciting White Paper projectsACT
- FTInfrastructure/Solution ArchitectNSW
- FTTechnical Business Analyst (Integration background)NSW
- CCLevel 1 Helpdesk SupportNSW
- CCContract IT Assistant (IT Security/IT Audit) 160621/ITA/361Asia
- CCRelease & Configuration Manager | Defence intelligence application | NV1 clearedACT