Over the last few days, a large number of British Airways customers have found that reward points they accumulated for flights, called Avios, have disappeared from their accounts. Others have been locked out of their accounts completely.
Some Internet gateway devices commonly used by hotels and conference centers can easily be compromised by hackers, allowing them to launch a variety of attacks against guests accessing the Wi-Fi networks.
Attackers could have remotely installed malware on systems running a flawed Dell support tool used to detect customers' products.
You don't need to be the NSA to tap calls on Cisco's SPA 300 and 500 IP phones: An authentication flaw allows potential attackers to do that by default.
It came as a shock to just about no one in the cybersecurity industry that China has a cyberware unit, which was acknowledged by the government there this week.
More than 700,000 ADSL routers provided to customers by ISPs around the world contain serious flaws that allow remote hackers to take control of them.
As many as 11 million customers may have been affected by a data breach at U.S. health insurance provider Premera Blue Cross, in the second large attack against the health care industry disclosed in the last two months.
A collection of computer Trojans that have been used since 2009 to steal data from government agencies, military contractors, media organizations and other companies is tied to cyberespionage malware possibly created by French intelligence agencies.
British law enforcement agencies arrested a 23-year-old man suspected of being involved in a hacking attack last year against a satellite communications system operated by the U.S. Department of Defense.
Adobe Systems launched a new program that encourages security researchers to find and report vulnerabilities in the company's websites and other online services.
Lenovo's website appeared to have been hacked on Wednesday, possibly in retaliation for a piece of adware it installed on PCs that was found to have opened up a security hole.
Security researchers are urging users to install new Samba security updates in order to address a critical vulnerability that allows attackers to execute arbitrary code with root privileges.
Attackers who penetrate company networks often pose as legitimate users for long periods of time, causing lengthy delays before victims figure out they've been hacked.
U.S. and U.K. intelligence agencies have reportedly hacked into the computer network of giant SIM card maker Gemalto and taken smartphone encryption keys potentially used by customers of hundreds of mobile phone carriers worldwide.
A cyberespionage group with a toolset similar to ones used by U.S. intelligence agencies has infiltrated key institutions in countries including Iran and Russia.
Gadgets & Things
Most Popular Reviews
- 1 Finally! LG OLED TV 2016 range review
- 2 Huawei Nova Plus smartphone review
- 3 Apple iPhone 7 Plus review: including Portrait Mode
- 4 Google Daydream View VR full, in-depth review
- 5 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
Join the PC World newsletter!
Latest News Articles
- Pompeo sworn in as CIA chief amid opposition from surveillance critics
- 10 ways to get an IT Job in 2017
- Trump names net neutrality foe Ajit Pai to lead the FCC
- Samsung sees 2016 profit jump despite Note 7 debacle
- Microsoft expands FastTrack migration service
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- Time to ditch Foxtel and the iQ3: How to replace Foxtel packages with cheaper alternatives
- The top 10 best and worst tech gadgets and products of 2016
- TV of the year award 2016
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- FTLife/400 Developers / Programmers - Permanent - North Ryde areaNSW
- CCMicrosoft Active Directory ArchitectACT
- FTJava DeveloperSA
- FTPERMANENT Business AnalystsACT
- FTTest Analyst - HealthcareVIC
- CCProgram Support OfficerNSW
- CCICT Contracts ManagerSA
- FTBI Tech Lead l Informatica ETL , Microstrategy, Big Data TechnologiesNSW
- CCFIS Connex Developer (Brisbane Based)Other
- TPICT Project CoordinatorQLD
- TPSenior Analytics Analyst DeveloperVIC
- CCPerformance AnalystVIC
- CCBusiness Analyst Finance & LendingQLD
- TPService Delivery ManagerQLD
- CCSystem EngineerSA
- CCTechnical WriterACT
- FTConsulting Solution/Integration ArchitectVIC
- FTSecurity Incident / SOC Analyst (Tier 1) - Permanent - North Ryde BasedNSW
- TPDigital Business Analyst | AgileQLD
- CCService ManagerACT
- TPDrupal Developer - Immediate startQLD
- CCDigital Business Analyst l SalesforceNSW
- FTAutomation TesterVIC
- CCMigration OfficerQLD
- FTSolutions Architect - Data Centre/ NetworkSA