Police in several European countries arrested 49 suspected members of a gang they say broke into corporate email accounts, using them to divert payments from business customers.
A new tool allows hackers to generate URLs that can hijack accounts on sites that use Facebook Login, potentially enabling powerful phishing attacks.
Google has released a security scanner to help its cloud customers guard against attacks on their Web applications.
Apple products are some of the most expensive and desirable in tech so it makes sense that the company's gift cards are proving an attractive currency for criminals.
Having to remember multiple passwords may soon be a thing of the past.
Chip-and-PIN payment cards have a strong supporter in the hotbed of payment technologies, with San Francisco's district attorney promoting the new technology as a way to cut down on fraud.
A 28-year-old man was sentenced to more than nine years in prison Wednesday for buying stolen credit and debit card numbers from an underground online marketplace.
In an effort to make to make Internet and mobile transactions more secure, American Express has launched a new service that aims to replace payment card numbers with unique tokens.
Cybercriminals have a new tool to make the most of stolen credit card details before payment processors detect the fraud, security researchers warn.
Facebook and Yahoo have developed a mechanism to prevent the owners of recycled email addresses from hijacking accounts that were registered on other sites using those addresses in the past.
The hackers behind the Kelihos botnet are trying to capitalize on users' increased awareness about the security of Apple online accounts through a new phishing campaign.
Romanian and French authorities have dismantled a cybercriminal network that infected computers at money transfer outlets across Europe and used them to perform illegal transactions.
A Russian man suspected of hacking into point-of-sale systems at U.S. retailers has been arrested and faces charges in a U.S. court, the Department Justice said.
YouTube has thousands of videos promoting compromised credit card numbers, with the site sometimes running advertisements for legitimate credit cards or retail outlets alongside the hacker videos, according to a new report from an online safety group...
A Romanian man sentenced just last week in his own country for raiding online accounts linked to prominent politicians and celebrities was indicted Thursday in a U.S. federal court.
Most Popular Reviews
- 1 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 2 D-Link Taipan AC3200 Ultra tri-band modem-router review
- 3 BlackBerry Priv review: When old habits die hard
- 4 Dell XPS 13 (2016) review: Making the very best Ultrabook
- 5 Microsoft Surface Book review: The verdict on Microsoft's first notebook
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- Upgrading to SAP Hana? This new tool can help prepare your code
- The eyes have it: How one startup aims to change the future of VR
- Gaming on Linux, Steam machines set to soar with DirectX competitor Vulkan
- Google didn't abuse its position in Streetmap case, UK court rules
- New Chromebook won't break with 365-pound person standing on it
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTDigital Marketing Specialist | Media BuyerNSW
- CCSenior Server EngineerNSW
- CCSAP DS and BI SpecialistVIC
- FTSenior Mobile Developer - IOSNSW
- FTTechnical Lead (Java)NSW
- CCAngularJS DeveloperNSW
- FTIT Cyber Security Requirements ConsultantACT
- CCEnterprise ArchitectNSW
- CCIteration Manager/ Sprint Manager- PenrithNSW
- FTOracle Middleware ConsultantNSW
- CCProducts and Markets Business AnalystNSW
- CCSolutions ArchitectNSW
- FTUX Front-End DeveloperWA
- CCTeradata DeveloperNSW
- FTJava or Ruby Web DeveloperVIC
- FTWintel EngineerNSW
- CCSenior Network EngineersACT
- CCRisk AnalystVIC
- CCInfrastructure ConsultantNSW
- FTIT Project ManagerSA
- FTApplication Support AnalystVIC
- FTNetwork Engineer | NV1 NV2 clearance | Defence projects | Immediate interviewACT
- CC.NET DeveloperACT
- FTSenior Business ConsultantNSW
- FTImplementation Consultant, Enterprise SoftwareNSW