Apple released patches for several exploits that could allow maliciously crafted applications to destroy apps that already exist on devices, access their data or hijack their traffic, but a large number of iOS devices are still vulnerable.
The U.S. Securities and Exchange Commission is concerned that data stolen from companies in cyberattacks is being used to conduct what effectively is insider trading, Reuters reported on Tuesday.
Adobe Systems released an emergency security update for Flash Player Tuesday to fix a critical vulnerability that has been exploited by a China-based cyberespionage group.
Cybercriminals are targeting employees who browse the Web or check their email from point-of-sale (PoS) computers, a risky but unfortunately common practice.
The shamelessness of ransomware pushers knows no bounds. After encrypting people's files and then holding them to ransom, they portray themselves as service providers offering technical support and discounts to their "customers."
Microsoft has taken steps to stop a China-based hacking group from using its TechNet website as part of its attack infrastructure, according to security vendor FireEye.
Cybercriminals are increasingly copying cyberespionage groups in using targeted attacks against their victims instead of large-scale, indiscriminate infection campaigns.
Hewlett-Packard is partnering with computer security company FireEye to give it a technological edge in detecting and investigating cyberattacks.
A fresh attack by a long-known hacking group suspected to be linked with Russia did little to mask its activity in an attack a week ago.
An otherwise unremarkable hacking group likely aligned with China appears to be one of the first to have targeted so-called air-gapped networks that are not directly connected to the Internet, according to FireEye.
Cybercriminals are exploiting newly patched vulnerabilities faster, a sign that users and companies need to improve their software updating habits.
Attackers who penetrate company networks often pose as legitimate users for long periods of time, causing lengthy delays before victims figure out they've been hacked.
A malware program designed for Linux systems, including embedded devices with ARM architecture, uses a sophisticated kernel rootkit that's custom built for each infection.
Syrian opposition leaders lost gigabytes of secret communications and battlefield plans to hackers who baited them into downloading malware during flirtatious Skype chats, according to a report released Sunday.
Security researchers have discovered a vulnerability in iPhones and iPads that allows attackers to install fake apps that take the place of legitimate ones.
Most Popular Reviews
- 1 Sony Xperia Z4 Tablet (LTE) review: The tablet of choice for anyone on Android
- 2 Bose SoundLink Mini II Bluetooth speaker review
- 3 Apple MacBook Air 2015 review: Only better with time
- 4 HTC One (M8s) review: Better value for money than HTC's flagship
- 5 ZTE Blade S6 review: A dual-SIM, 4G smartphone for less than $300
Join the PC World newsletter!
Deals on PC World
- Networking, Wireless & VoIP
Deals on PC World
Latest News Articles
- Google's self-driving cars are taking a road trip to Texas
- EMC sells Syncplicity to focus on core storage business
- OwnCloud's new encryption framework gives enterprises more flexibility
- Former attorney general calls Snowden deal possible
- BBC unveils final version of micro:bit coding device for kids
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCInternal Communications ExecutiveNSW
- FTAccount Manager - PR AgencyNSW
- FTMedia and Communications AdvisorACT
- FTTechnical Sales Support Representative - The Worlds largest Search Engine!NSW
- CCSenior Drupal DeveloperNSW
- FTSenior Account Manager - PR AgencyNSW
- CCInternal Communications AdvisorNSW
- FTPR & Corporate Affairs ManagerNSW
- CCDrupal DeveloperNSW