An Electronic Arts website was hacked in a phishing scheme aimed at the acquisition of Apple IDs and credit card numbers, security researchers reported Wednesday.
Metadata has had a bad rap lately, with disclosures tying its collection to government spying programs. But those bits of information lurking behind our phone calls, photos and online chats can be useful in other ways if they're harnessed properly.
Mastercard and roaming infrastructure company Syniverse have come up with a way to protect credit card transactions abroad with help from a phone's location.
The U.S. Congress should pass a law requiring businesses that have lost customer information in cyberattacks to notify those affected, U.S. Attorney General Eric Holder said Monday.
The source code for an Android mobile banking Trojan app was released on an underground forum, making it possible for a larger number of cybercriminals to launch attacks using this kind of malware in the future.
One in three data breach victims in 2013 later experienced fraud, according to a survey released Wednesday, a sharp increase that doesn't bode well for millions of Target shoppers.
A team of researchers has developed an Android app to help people better understand when their location is being accessed, something that happens more often than people think.
GoDaddy has acknowledged that one of its employees fell victim to a social engineering attack allowing a hacker to take over a customer's domain names and eventually extort a coveted Twitter user name from him. PayPal, which the victim claimed also p...
A list of 16 million email addresses and passwords has fallen into the hands of botnet operators, the German Federal Office for Information Security (BSI) said Tuesday.
Two Mexican nationals have been arrested in Texas after they allegedly attempted to enter the U.S. with fraudulent credit cards that could be tied to the massive Target data breach.
Palo Alto Networks, an enterprise security company, has acquired Silicon Valley startup Morta Security in a deal that the companies say will better help their clients defend themselves against increasingly sophisticated cyberattacks.
Target has confirmed that hackers obtained customer debit card PINs (personal identification numbers) in the massive data breach suffered by the retailer during the busy holiday shopping season, but says customers should be safe, as the numbers were ...
The Washington Post's servers were recently broken into by a group of unknown origin that gained access to the user names and passwords of its employees, the paper said on Wednesday.
The Internet Archive, the online repository of millions of digitized books, wants to shield its readers from other's prying eyes -- like the government's.
Four men have been arrested by the U.K.'s National Crime Agency (NCA) for drug offenses in connection with their involvement in Silk Road, an Internet underground marketplace for drugs and other illegal items.
Most Popular Reviews
- 1 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
- 2 Sony Xperia XZ review: turbo-charged last-gen phone
- 3 Sony X9300D and X8500D UHD 4K TV review
- 4 Hisense Series 7 ULED 4K UHD TV review
- 5 Moto X Force review: Leading features from a mid-range phone
Join the PC World newsletter!
Latest News Articles
- Intel wants to make its IoT chips see, think, and act
- Workstation software flaw exposes industrial control systems to hacking
- Critical account creation flaws patched in popular Joomla CMS
- ARM builds up security in the tiniest IoT chips
- Google is trying to reinvent the whiteboard
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- Google Pixel XL full, in-depth smartphone review: The new best Android phone
- Japan Robot, gadget and car expo slideshow
- Panasonic DX900U UHD 4K smart TV review: Best all-round TV ever?
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- FTMicrosoft Dynamics AX Manufacturing ConsultantWA
- CCContract Programmer (.Net/SQL) 161027/P/vhaAsia
- CCSOE EngineerACT
- CCSenior Java Developer-Java SE 8, HTTP APIs, Protocol BuffersNSW
- CCEMC Storage ConsultantWA
- FTUI UX Specialist | Technical BAQLD
- CCCisco Voice ConsultantWA
- CCSolutions Architect (Data Warehouse/Application Integration) - Contract - SydneyNSW
- CCDatacenter EngineerNSW
- FTSoftware DeveloperQLD
- CCContract IT Assistant (PC LAN Support) 161114/ITA/411Asia
- CCSystem AdministratorNSW
- FTSoftware DeveloperWA
- FTWeb Business AnalystQLD
- CCSenior Project Manager - IT Solutions - GovernmentNSW
- FTBackup Engineer with Commvault ExperienceNSW
- FTMicrosoft Dynamics AX Finance ConsultantQLD
- CCProject SchedulerSA
- FTSenior Business Analyst - Telco - Melbourne CBDVIC
- FTiOS Developer - PermanentWA
- FTMicrosoft Dynamics AX Technical ArchitectWA
- CCWeb DeveloperNSW
- FTCapacity PlannerNSW
- CCSenior Visual DesignerNSW