From televisions to passenger planes, even the most unassuming device can, if accessed by the wrong people, be turned into something more sinister.
hacking in pictures
From online bank heists to Chinese hackers, 2013 is adding up to be a security mess
Whether it is on the phone, online or in person, here are ten lies hackers, phishers and social engineers will tell you to get what they want
Even the noise from your PC’s fans could be used to steal the data inside. Researchers in Israel have found a way to do just by hijacking the fans inside and manipulating the sounds they create.
Russian government hackers managed to breach the computer network of the Democratic National Committee and stole opposition research on presidential candidate Donald Trump.
A hacker is trying to sell a zero-day privilege escalation exploit that allegedly affects all Windows versions and bypasses all common exploit mitigations on a cybercrime forum.
A hacker is trying to sell a database dump containing account records for 167 million LinkedIn users.
A U.S. senator will introduce legislation to roll back new court rules allowing judges to give law enforcement agencies the authority to remotely hack computers.
"Hunting is not a sport. In a sport, both sides should know they're in the game." - According to Field and Stream magazine, this is an oft quoted hunting expression. I couldn’t resist the irony of applying this quote to the cyber security industry wh...
Netflix is securing the borders of its US library, but the latest crackdown is another token effort in a war it can never win.
How concerned should business users be about wireless security now that another group claims to have cracked the security scheme used by 80 percent of the world's cellular telephones?
TechCrunch concluded its days-long drip of <a href="http://www.pcworld.com/article/168462/twitter_hacked_secrets_to_be_revealed.html?tk=rel_news">stolen Twitter documents</a> with details on the company's conversations with Google and Microsoft.
Whitepapers about hacking
Having an identity and access management solution is a must. Businesses cannot operate without them. However, this paper asks - are you sure the user credentials are being used by the correct individual? · Most organizations work hard to ensure compliance with corporate security policy but that doesn’t necessarily mean they’re protected · Managing identities is essential—but it can also lead to a false sense of security · Do the credentials and the behaviour make business sense? If you can’t interpret activity in the context of identity, you may be at risk
Most Popular Reviews
- 1 Huawei P9 review: lifting photography to another level... sometimes.
- 2 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 3 D-Link Taipan AC3200 Ultra tri-band modem-router review
- 4 Dell XPS 13 (2016) review: Making the very best Ultrabook
- 5 Microsoft Surface Book review: The verdict on Microsoft's first notebook
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- Microsoft appears to be building a business app marketplace
- Sony Xperia X Performance review: Sony’s most disappointing product in years
- Box Shuttle makes it easier to ditch on-prem file storage
- Facebook wins appeal over tracking non-members in Belgium
- Terror-suspect database used by banks, governments, has been leaked
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTFront End .Net Developer (.Net / Angular / Bootstrap)NSW
- CCRelease & Configuration Manager | Defence intelligence application | NV1 clearedACT
- CCContract Analyst Programmer (JAVA/SQL) 160620/AP/623Asia
- CCNetwork EngineerACT
- CCSharePoint DeveloperSA
- CCWindows 2003-2012 R2 Active Directory Consultant/ManagerNSW
- CCTechnology and Security ArchitectACT
- CCSpatial DeveloperQLD
- CCProject ManagerNSW
- CCSnr IT Project Manager - Contact CentreVIC
- FTSenior Manager Practice LeadNSW
- CCUrgent requirement for a Splunk SMEVIC
- FTUX DesignerVIC
- CCBusiness Analyst - BPRNSW
- CCSenior IT Automated TesterNSW
- CCProject Manager (Omni-Channel)VIC
- CCSenior Project ManagerNSW
- CCSAP Portal DeveloperVIC
- FTDevelopment/Architect Capability ManagerVIC
- FTIT Service Desk AnalystNSW
- CCContract Analyst Programmer (J2EE/Oracle) 160704/AP/601Asia
- CCEnvironment Manager - POSVIC
- CCMidrange Technical ArchitectQLD
- CCProject ManagerNSW
- FTFull-Stack .NET DeveloperVIC