The former administrator of Darkode, the online cybercrime forum that was recently shut down by law enforcement agencies, is preparing to bring it back, with better security and privacy for its members.
A small group of Nigerian scammers is using more sophisticated methods to defraud mostly Asian businesses, including buying exploit kits and malware from experienced coders, according to a new report from FireEye.
The online advertising industry is marshaling a fresh effort to fight click fraud, which steals money from advertisers and undermines faith in online campaigns.
Cybercriminals are casting increasingly wider nets in their search for new point-of-sale systems to infect. This appears to be the case with a new memory scraping malware program called GamaPoS that's distributed by a large botnet known as Andromeda.
The Internet could see a new wave of botnets based on the ZeusVM banking Trojan after the tools needed to build and customize the malware program were published online for free.
Scotty Zifka was looking for a sales job. He started one in late May at a company called EZ Tech Support, a small inbound call center in an older building in northeast Portland, Oregon.
Police in several European countries arrested 49 suspected members of a gang they say broke into corporate email accounts, using them to divert payments from business customers.
The data breach landscape could look very different in the future with the increased adoption of chip-enabled payment cards in North America -- but for now point-of-sale systems account for the majority of breaches there, compared to a tiny minority ...
Cybercriminals in Japan are targeting iPhone users with an online scam that tricks them into installing a malicious application when they attempt to view porn videos.
Sally Beauty Holdings has confirmed that hackers broke into its payment systems and stole customer card data. About a year ago the retail chain suffered a similar intrusion.
Romanian authorities have detained 25 people who are suspected of being members of an international gang of cyberthieves who hacked into banks, cloned payment cards and used them to steal over US$15 million.
Some of the world's leading cryptographers are concerned about the increasing number of malicious programs that hold computers and mobile phones to ransom, in many cases by abusing the encryption algorithms they designed.
For the first time, a country in Western Europe has reported that malware attacks were used by hackers to steal €1.23 million (US$1.32 million) from ATMs. One major problem is the continued use of Windows XP in ATMs, making them more vulnerable to at...
Google has identified and disabled 192 Chrome browser extensions that injected rogue ads into Web pages opened by users without being upfront about it. The company will scan for similar policy violations in future.
Retailers beware: A new Trojan program targets point-of-sale (PoS) terminals, stealing payment card data that can then be abused by cybercriminals.
Most Popular Reviews
- 1 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 2 BlackBerry Priv review: When old habits die hard
- 3 Dell XPS 13 (2016) review: Making the very best Ultrabook
- 4 Microsoft Surface Book review: The verdict on Microsoft's first notebook
- 5 Google Nexus 6P review: An outstanding multimedia machine
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- JB Hi-Fi reaches $2bn revenue mark for 2016 half-year results
- Optus moves into wearables space with Cash by Optus
- Modular cellphone kit can be used for IoT and wearables
- Now that AI has mastered 'Go,' are all our jobs next?
- You're so vein: Samsung files a patent for a vein-scanning smartwatch
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCMultiple Senior Business Analyst opportunitiesSA
- FTSystems Administrator/Engineer | Projects & BAU | Coastal Newcastle NSWWA
- CCTechnical Business Analyst (Telecommunications) / Melb CBDVIC
- CCTechnical Lead - .NET TechnologiesNSW
- CCContract Analyst Programmer (JAVA/Oracle/UNIX) 160203/AP/381Asia
- FTBusiness Intelligence AnalystVIC
- CCSAP Basis Admin with JavaACT
- CCDesktop Support L1, 2 & 3NSW
- CCSenior Information Security SpecialistNSW
- CCSenior Test AnalystSA
- FTUX Front-End DeveloperWA
- FTSenior C# .NET Developer (Focus WCF, MVC)VIC
- CCSenior Agile Business Analyst - Online/Mobile experienceNSW
- CCSenior Systems Analyst (Biomedical)SA
- FTJunior Project Manager | Permanent role in Canberra | NV1/2 clearedACT
- CCSenior Business Analyst - Life InsuranceVIC
- CCProject ManagerACT
- CCTechnical Lead - .NET TechnologiesACT
- CCSenior Business AnalystWA
- FTInsight / Customer / modelling - Analyst (Data Scientist)NSW
- FTSoftware Developer - Ruby on RailsNSW
- FTTechnical Support EngineerNSW
- CCFront End DeveloperVIC
- CCSAP HR Functional ConsultantNSW
- CCContract Analyst Programmer (MS.Net/Visual Basic) 160129/AP/vtdAsia