Two Romanian men were sentenced Wednesday to serve prison sentences for remotely hacking into hundreds of U.S. merchants' computers and stealing payment card data, the U.S. Department of Justice said.
Following through on an order earlier this year from U.S. President Barack Obama, the National Institute of Standards and Technology (NIST) is rapidly developing a set of guidelines and best practices to help organizations better secure their IT syst...
A new Web-based service for cybercriminals automates the creation of fake scanned documents that can help fraudsters bypass the identity verification processes used by some banks, e-commerce businesses and other online services providers, according t...
The U.S. will not seek the death penalty for Edward Snowden, the former intelligence contractor responsible for leaking documents revealing classified government surveillance programs, according to a recent letter from attorney general Eric Holder.
Five men from Russia and Ukraine have been indicted in New Jersey for charges they conspired with each other in a worldwide hacking scheme targeting major corporate networks that compromised more than 160 credit card numbers, the U.S. Department of J...
Edward Snowden, the leaker of documents that revealed National Security Agency surveillance programs, has submitted a request for temporary asylum in Russia and could be granted a decision within several weeks, according to news reports.
Several underground marketplaces are offering full information packages for sale that contain verified health insurance credentials, bank account numbers, Social Security numbers and other personal information, along with counterfeit physical documen...
A 30-year-old Bulgarian was extradited to the U.S. from Paraguay in order to face charges related to his alleged involvement in Shadowcrew, a large cybercrime forum that was dismantled by U.S. authorities in 2004.
Google is revealing some new numbers around malware and phishing attempts in an effort to get more people thinking about online security and to make the Web safer.
Add LinkedIn to the list of Internet companies trying to make themselves safer from cyberattacks by adding two-step authentication.
A vast debit card fraud scheme that allegedly netted $US45 million has been linked to the hacking of credit card processors in the US and India.
More than 50 million users of the daily deals site LivingSocial are being asked to reset their passwords after hackers attacked the company's servers and potentially made off with personal data.
Following similar initiatives by Apple, Google and Facebook, Microsoft is enabling two-factor authentication for its Microsoft Account service, the log-on service for many of its online and desktop products.
An online bitcoin storage service, Instawallet, said Wednesday it is accepting claims for stolen bitcoins after the company's database was fraudulently accessed.
A new piece of malware that infects point-of-sale (POS) systems has already been used to compromise thousands of payment cards belonging to customers of U.S. banks, according to researchers from Group-IB, a security and computer forensics company bas...
Most Popular Reviews
- 1 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 2 BlackBerry Priv review: When old habits die hard
- 3 Dell XPS 13 (2016) review: Making the very best Ultrabook
- 4 Microsoft Surface Book review: The verdict on Microsoft's first notebook
- 5 Google Nexus 6P review: An outstanding multimedia machine
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- Modular cellphone kit can be used for IoT and wearables
- Now that AI has mastered 'Go,' are all our jobs next?
- Make a $40 Linux or Android PC with new Raspberry Pi 2 rival
- Researcher finds serious flaw in Chromium-based Avast SafeZone browser
- Dridex banking malware mysteriously hijacked to distribute antivirus program
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCSenior Project Manager - HRIS ProjectQLD
- FTNetwork Engineer | Canberra | NV1 NV2 clearance | Defence projectsVIC
- CCChange LeadNSW
- CCICT Infrastructure Specialist - (Network Engineer)ACT
- FTNetwork Systems LeadVIC
- CCInformation ArchitectQLD
- CCSenior Business AnalystQLD
- CCOracle Applications Projects Functional ConsultantSA
- FTPrograme ManagerNSW
- CCInformation Security ManagerNSW
- CCSharepoint AdministratorVIC
- FTProject Manager | SharePoint, Office 365 SkillsVIC
- FTAndroid DeveloperNSW
- CCSQL DeveloperVIC
- FTSenior Front End Developer Required Working World Leading Digital TeamVIC
- CCSenior Agile Business AnalystVIC
- FTPrincipal Business Analyst (SQL/SAS)NSW
- CCSenior Project Manager - DigitalVIC
- CCContract Analyst Programmer (JAVA/Crystal Report) 160115/AP/vhsAsia
- CCOracle CC&B Technical AnalystVIC
- FTInsight / Customer - Data ScientistNSW
- FTServer EngineerNSW
- CCRecords Officer - CanberraACT
- CCSenior Project ManagerNSW
- CCContract System Analyst (Network & System Mgt.) 160205/SA/561Asia