From televisions to passenger planes, even the most unassuming device can, if accessed by the wrong people, be turned into something more sinister.
hacking in pictures
From online bank heists to Chinese hackers, 2013 is adding up to be a security mess
Whether it is on the phone, online or in person, here are ten lies hackers, phishers and social engineers will tell you to get what they want
Thursday's confirmed breach at Yahoo means that a treasure trove of stolen data is very likely circulating on the black market -- potentially putting millions of internet users at risk.
A U.S. lawmaker has introduced two bills to protect voting systems from hacking, amid fears that Russian cyber spies may be interfering with this year's presidential election.
A U.K. judge has ruled in favor of extraditing a British man to the U.S. for hacking government computers, despite fears he may commit suicide.
The FBI’s refusal to reveal how it accessed an iPhone 5c from the San Bernardino shooter will face scrutiny in court. USA Today’s parent company and two other news group have filed a lawsuit against the agency, demanding it turn over the details.
The FBI may have paid a small fortune to unlock an iPhone 5c used by the San Bernardino shooter. But a security researcher has demonstrated a way to do it for less than $100.
Here’s how to find out if your child is involved in malicious online activity -- before the authorities do
"Hunting is not a sport. In a sport, both sides should know they're in the game." - According to Field and Stream magazine, this is an oft quoted hunting expression. I couldn’t resist the irony of applying this quote to the cyber security industry wh...
Netflix is securing the borders of its US library, but the latest crackdown is another token effort in a war it can never win.
How concerned should business users be about wireless security now that another group claims to have cracked the security scheme used by 80 percent of the world's cellular telephones?
TechCrunch concluded its days-long drip of <a href="http://www.pcworld.com/article/168462/twitter_hacked_secrets_to_be_revealed.html?tk=rel_news">stolen Twitter documents</a> with details on the company's conversations with Google and Microsoft.
Whitepapers about hacking
Having an identity and access management solution is a must. Businesses cannot operate without them. However, this paper asks - are you sure the user credentials are being used by the correct individual? · Most organizations work hard to ensure compliance with corporate security policy but that doesn’t necessarily mean they’re protected · Managing identities is essential—but it can also lead to a false sense of security · Do the credentials and the behaviour make business sense? If you can’t interpret activity in the context of identity, you may be at risk
Most Popular Reviews
- 1 Hisense Series 7 ULED 4K UHD TV review
- 2 Samsung Galaxy Note 7 review
- 3 Portable power: Venom Blackbook 13 Zero review
- 4 Alcatel Idol 4S review: King of the mid-range?
- 5 Samsung Galaxy S7 Edge Review
Join the PC World newsletter!
Latest News Articles
- Ransomware spreads through weak remote desktop credentials
- Linksys EA9500 Max-Stream AC5400 MU-MIMO Gigabit router review
- Four state AGs sue to block US decision to cede key internet role
- Salesforce tries to block Microsoft's LinkedIn acquisition
- Paris motor show turns on to electric cars
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTCertification and Accreditation Security ConsultantACT
- FTTest Manager (HP Quality Centre / ARIBA)NSW
- FTTest SpecialistSA
- CCIT Security ArchitectACT
- CCData Analyst | Data Management Framework | Experience in RNSW
- CCSoftware TesterACT
- FTCustomer Solutions Engineer | Voice | Data | TelcoNSW
- FTJava DeveloperNSW
- CCSenior .NET DeveloperVIC
- FTBusiness Development Manager | ICT intelligent systems integrationVIC
- CCContract Web Developer (160915/WD/vmp)Asia
- CCContract Systems Analyst (IT Security) 160928/JP/653Asia
- FTOutbound TelesalesVIC
- CCFull Stack Application Developer - IoT projectsVIC
- CCSolutions ArchitectACT
- FTCarrier/ Industrial Network ConsultantsWA
- CCInformatica Developer (MDM)NSW
- CCJava / J2ee ProgrammersACT
- CCICT Security AuditorACT
- CCBI Reporting AnalystACT
- CCData Analyst | Data Feeds | Catalogue and MapNSW
- FTPositive Vetted ICT positions - Defence intelligence and information securityACT
- FTLinux Systems AdministratorNZ
- CCDigital Solutions ManagerNSW
- CCInfrastructure Project Manager - DCR ProjectNSW