A critical vulnerability that was recently found in the low-level firmware of Lenovo ThinkPad systems also reportedly exists in products from other vendors including HP and Gigabyte Technology.
Even the noise from your PC’s fans could be used to steal the data inside. Researchers in Israel have found a way to do just by hijacking the fans inside and manipulating the sounds they create.
Russian government hackers managed to breach the computer network of the Democratic National Committee and stole opposition research on presidential candidate Donald Trump.
A hacker is trying to sell a zero-day privilege escalation exploit that allegedly affects all Windows versions and bypasses all common exploit mitigations on a cybercrime forum.
A hacker is trying to sell a database dump containing account records for 167 million LinkedIn users.
A U.S. senator will introduce legislation to roll back new court rules allowing judges to give law enforcement agencies the authority to remotely hack computers.
The hacker who leaked 400GB of internal files and emails from Italian surveillance software maker Hacking Team published a full account of how he infiltrated the company's network.
The cost of cybercrime services has dropped dramatically according to a recent investigation into forums and marketplaces on the Dark Web.
IoT security wake-up call: A white supremacist hacker sends racist documents to thousands of publicly-exposed connected printers.
Cybercriminals are redoubling efforts to steal payment card details from retailers before new defenses are put in place, according to FireEye.
A malware researcher has found a few tricks to stop one of the latest types of ransomware, called Locky, from infecting a computer without using any security programs.
German researchers have discovered two dozen vehicles that use wireless key entry systems that are vulnerable and allow the radio signal to be intercepted and used to steal a car.
The Tor Project is fortifying its software so that it can quickly detect if its network is tampered with for surveillance purposes, a top developer for the volunteer project wrote on Monday.
Adobe Systems' Flash plugin gets no love from anyone in the security field these days. A new study released Monday shows just how much Flash is favored by cybercriminals to sneak their malware onto computers.
Thousands of medical devices, including MRI scanners, x-ray machines and drug infusion pumps, are vulnerable to hacking, creating significant health risks for patients, security researchers said this week.
Most Popular Reviews
- 1 Samsung Galaxy Note 7 review
- 2 Portable power: Venom Blackbook 13 Zero review
- 3 Alcatel Idol 4S review: King of the mid-range?
- 4 Witness a 241% Australian price hike: Dell Latitude 7370 review
- 5 Is this the best value phone on the market? Moto G4 Plus review
Join the PC World newsletter!
Latest News Articles
- AC5300 Router reviews: Linksys EA9500 vs. Netgear Nighthawk X8 vs. D-Link DIR-895L
- Facebook further automates trending topics, ditches human-written descriptions
- Dell Inspiron 17 7778 review: This massive 17-inch 2-in-1 is a worthwhile desktop replacement
- Inside Amazon's, Facebook's and Google's self-serving 'philanthropy'
- Try this! 6 new Android 7.0 Nougat features to use now
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCWindows EngineerVIC
- CCDB2 Database AdministratorACT
- CCICT Security Design & Implementation - NV1ACT
- FTPython Data EngineerWA
- CCIT Support Officer- SAP (tool experience)NSW
- CCContract Systems Analyst (Windows 7/8/10) 160901/SA/212Asia
- CCContract Systems Analyst (Data Management/Web) 160818/SA/602Asia
- CCTechnology Specialist Networks & SecurityVIC
- FTTechnical Lead | Senior Java Developer | EcommerceNSW
- CCSenior Project Manager - Contact CentresNSW
- FTSenior Full Stack .Net DeveloperVIC
- CCContract Programmer (IT Security/Website Admin.) 160824/P/567Asia
- CCBusiness Intelligence Business AnalystSA
- CCSenior Integration Specialist - IP NetworkVIC
- FTUnix Systems AdministratorNSW
- CCData Analyst - multiples roles - EAM experience requiredNSW
- FTJava DeveloperNSW
- CCSolution Architect - WMS/LogisticsVIC
- CCSenior Business Analyst/Designer, Funds ManagementNSW
- FTProject ManagerNSW
- CCCustomer Service SpecialistVIC
- CCIT Program Manager - TelecommunicationsNSW
- CCProject Manager - Operational TechnologyQLD
- FTPMO SpecialistACT
- CCSolution Architect, Funds Management, Part time roleNSW