A security system undergoing testing by a San-Francisco-based company aims to speed up the detection of websites and domains used for cybercrime.
Experts are warning of a serious security flaw that has apparently gone undetected for years and can weaken encrypted connections between computers and websites, potentially undermining security across the Internet.
D-Link issued fixes on Monday for flaws that could allow remote access to one of its routers, and will patch several other models in the coming week.
A pair of vulnerabilities found in hardware and software for playing Blu-ray discs might come in handy for secret snooping by the U.S. National Security Agency.
Aggressive adware applications that break the trust between HTTPS (HTTP Secure) websites and users have been at the center of controversy lately. But over the past week, HTTPS interception flaws of varying severity were also found in security program...
As a result of reports received through its bug bounty program Facebook confirmed and fixed 61 high-severity vulnerabilities last year, almost 50 percent more than in 2013.
Google is scrapping Pwnium, its annual bug hunting event, and folding it into an existing year-round program in part to reduce security risks.
Security researchers are urging users to install new Samba security updates in order to address a critical vulnerability that allows attackers to execute arbitrary code with root privileges.
Telegram, a messaging application that markets itself as a secure communication tool, doesn't handle encrypted conversations securely, according to the founder of a mobile security company.
New cases of insecure HTTPS traffic interception are coming to light as researchers probe software programs for implementations that could enable malicious attacks. The latest software to open a man-in-the-middle hole on users' PCs is a new version o...
On Thursday security researchers warned that an adware program called Superfish, which was preloaded on some Lenovo consumer laptops, opened computers to attack. However, it seems that the same poorly designed and flawed traffic interception mechanis...
An effort to search for cryptographic flaws in TrueCrypt, a popular disk encryption program, will resume even though the software was abandoned by its creators almost a year ago.
Lenovo has admitted it "messed up badly" by pre-loading software on some consumer laptops that exposed users to possible attack, and said it will soon release a tool to remove it.
An Arabic cyberespionage group has attacked thousands of high-profile targets in Egypt, Israel, Jordan and other countries for the past two years, cybersecurity vendor Kaspersky Lab said.
The Stuxnet computer worm that was used to sabotage the Iranian nuclear program was likely preceded by another sophisticated malware program that used some of the same exploits and spread through USB thumb drives to computers isolated from the Intern...
Most Popular Reviews
- 1 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 2 D-Link Taipan AC3200 Ultra tri-band modem-router review
- 3 Dell XPS 13 (2016) review: Making the very best Ultrabook
- 4 Microsoft Surface Book review: The verdict on Microsoft's first notebook
- 5 Telstra Wi-Fi 4GX Advanced III review: Testing the world's first 600Mbps wireless hotspot
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- EU prepares to end geoblocking in online sales of goods and services
- Microsoft kills off another chunk of its smartphone activities
- 11 Easy tips to keep yourself and your children safe online
- The Division review
- Need for Speed PC Review
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCScrum MasterACT
- FTSolution ArchitectVIC
- FTGraduate IT Support OfficerNSW
- CCBusiness AnalystNSW
- CCLinux AdministratorVIC
- CCProject CoordinatorACT
- CCContract Analyst Programmer (JAVA/J2EE/Oracle) 160523/AP/254Asia
- CCContract Computer Operator (UNIX/Windows-based) 1610524/CCO/vmtAsia
- CCContract Analyst Programmer (JAVA/J2EE) 160526/AP/506Asia
- FTOPEN_ASAP_Network Security AdministratorACT
- CCProgram Business Implementation Director- HR Payroll, FINSW
- CCDigital Project ManagerVIC
- CCHR Systems Support OfficerACT
- FTAX Lead Technical ConsultantNSW
- CCSolutions Architect - SAP HANAQLD
- CCSenior iOS DeveloperNSW
- FTMid-Level Full-Stack Java DeveloperVIC
- CCSr. Windows Server Administrator- Financial Institution BckgNSW
- FTFront End DeveloperACT
- CCService Desk analystSA
- FTSenior Business AnalystVIC
- CCNV1 Consultant | Groundbreaking Defence decision support applicationACT
- FTSenior Java Developer / Technical LeadACT
- CCIBM Sterling Developer + IBM Sterling Team LeaderNSW
- CCProject Manager - HFCVIC