From televisions to passenger planes, even the most unassuming device can, if accessed by the wrong people, be turned into something more sinister.
hacking in pictures
From online bank heists to Chinese hackers, 2013 is adding up to be a security mess
Whether it is on the phone, online or in person, here are ten lies hackers, phishers and social engineers will tell you to get what they want
A suspected Russian hacker arrested recently in the Czech Republic was involved in a massive 2012 data breach at LinkedIn, the professional social networking company says.
Attackers compromise online shops and store stolen payment card details inside legitimate image files in order to avoid detection.
The U.S. response to election-related hacks that the Obama administration now blames on the Russian government could include sanctions against that country.
U.S. officials are publicly blaming the Russian government for several high-profile hacks against political groups that they claim were meant to interfere with the upcoming election.
Thursday's confirmed breach at Yahoo means that a treasure trove of stolen data is very likely circulating on the black market -- potentially putting millions of internet users at risk.
Every time there's an election, the topic of hacking one comes to the surface. During a presidential election, that conversation gets louder. Yet, even the elections held every two years see some sort of vote hacking coverage. But can you really hack...
Here’s how to find out if your child is involved in malicious online activity -- before the authorities do
"Hunting is not a sport. In a sport, both sides should know they're in the game." - According to Field and Stream magazine, this is an oft quoted hunting expression. I couldn’t resist the irony of applying this quote to the cyber security industry wh...
Netflix is securing the borders of its US library, but the latest crackdown is another token effort in a war it can never win.
How concerned should business users be about wireless security now that another group claims to have cracked the security scheme used by 80 percent of the world's cellular telephones?
Whitepapers about hacking
Having an identity and access management solution is a must. Businesses cannot operate without them. However, this paper asks - are you sure the user credentials are being used by the correct individual? · Most organizations work hard to ensure compliance with corporate security policy but that doesn’t necessarily mean they’re protected · Managing identities is essential—but it can also lead to a false sense of security · Do the credentials and the behaviour make business sense? If you can’t interpret activity in the context of identity, you may be at risk
Most Popular Reviews
- 1 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
- 2 Sony Xperia XZ review: turbo-charged last-gen phone
- 3 Sony X9300D and X8500D UHD 4K TV review
- 4 Hisense Series 7 ULED 4K UHD TV review
- 5 Moto X Force review: Leading features from a mid-range phone
Join the PC World newsletter!
Latest News Articles
- Schneider Electric PLC simulator flaw exposes workstations to hacking
- London is next in line for Google-backed gigabit Wi-Fi
- US transport agency guidance on vehicle cybersecurity irks lawmakers
- Twitter said to plan 300 more job cuts this week
- Lyft customers face potential hack from recycled phone numbers
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- Google Pixel XL full, in-depth smartphone review: The new best Android phone
- Japan Robot, gadget and car expo slideshow
- Panasonic DX900U UHD 4K smart TV review: Best all-round TV ever?
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- TPTraining ManagerVIC
- CCWintel Technical LeadVIC
- CCIT Risk ManagerNSW
- FTFront End DeveloperSA
- FTSenior Analyst ProgrammerNSW
- FTSenior Full Stack DeveloperNSW
- CCEMC Storage ConsultantWA
- FTDynamics CRM DeveloperVIC
- FTDynamics CRM DeveloperSA
- CCICT Business AnalystACT
- CCTest Analyst : AutomationNSW
- TPSenior Business AnalystQLD
- FTSenior Functional Analyst - PeopleSoftQLD
- FTNetwork & Gateway EngineerACT
- FTProduct ManagerVIC
- CCContract Analyst Programmer (IT Security) 161018/AP/383Asia
- FTCRM Business Process AnalystVIC
- CCSiteCore CMS Content Support Officer - contract Initially - SydneyNSW
- CCSenior Procurement SpecialistVIC
- FTSenior Business Analyst - Telco - Melbourne CBDVIC
- TPSAP Project ManagerSA
- TPOracle Apex DeveloperWA
- FTWeb DeveloperNSW
- FTDevOps EngineerNSW