The maker of a widely used electronic lock has taken issue with a security company's criticism of one of its flagship products.
Security researchers have found that many satellite communication systems have vulnerabilities and design flaws that can let remote attackers intercept, manipulate, block and in some cases take full control of critical communications.
A mobile application designed to make it easier for RSA Conference 2014 attendees to navigate the event and interact with their peers exposes personal information, according to researchers from security firm IOActive.
Dozens of self-signed SSL certificates created to impersonate banking, e-commerce and social networking websites have been found on the Web. The certificates don't pose a big threat to browser users, but could be used to launch man-in-the-middle atta...
A security analysis of mobile banking apps for iOS devices from 60 financial institutions around the world has revealed that many were vulnerable to various attacks and exposed sensitive information.
Two security researchers at Defcon on Friday revealed the methods they used to hack into car computers and take over the steering, acceleration, brakes and other important functions.
Sensors widely used in the energy industry to monitor industrial processes are vulnerable to attack from 40 miles away using radio transmitters, according to alarming new research.
Devices used by many radio and TV stations to broadcast emergency messages as part of the U.S. Emergency Alert System (EAS) contain critical vulnerabilities that expose them to remote hacker attacks, according to researchers from security consultancy...
Hackers from China breached the computer network of The New York Times and stole passwords that allowed them to gain access to computers and email accounts for a period of four months, the newspaper reported late Wednesday.
ReVuln, a Malta-based security startup that specializes in vulnerability research, is working on a product that could allow companies to protect their SCADA (supervisory control and data acquisition) software installations against entire classes of v...
Users who signed into third-party Web or mobile applications using their Twitter accounts might have given those applications access to their Twitter private "direct" messages without knowing it, according to Cesar Cerrudo, the chief technology offic...
An increasing number of vulnerability researchers will focus their attention on industrial control systems (ICS) in the year to come, but so will cyberattackers, security experts believe.
A security researcher claims that he found 23 vulnerabilities in industrial control software from several vendors after a different security company last week showcased vulnerabilities in applications from some of the same manufacturers, but chose no...
CoDeSys, a piece of software running on industrial control systems (ICS) from over 200 vendors contains a vulnerability that allows potential attackers to execute sensitive commands on the vulnerable devices without the need for authentication, accor...
Barnaby Jack hit the jackpot at Black Hat on Wednesday. Twice.
Gadgets & Things
Most Popular Reviews
- 1 Finally! LG OLED TV 2016 range review
- 2 Huawei Nova Plus smartphone review
- 3 Apple iPhone 7 Plus review: including Portrait Mode
- 4 Google Daydream View VR full, in-depth review
- 5 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
Join the PC World newsletter!
Latest News Articles
- Cyber criminals avoid fraud within their own ranks with new site
- If you want to be an Xbox Insider, Microsoft says you'll now have to earn it
- In PC comeback, ARM will battle Intel in Chromebooks and Windows 10
- GPG Suite updated for secure email on OSX Sierra
- Microsoft's mobile apps will get better image capture and OCR via the Office Lens camera app
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- Time to ditch Foxtel and the iQ3: How to replace Foxtel packages with cheaper alternatives
- The top 10 best and worst tech gadgets and products of 2016
- TV of the year award 2016
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- FT.NET CMS DeveloperWA
- TPBusiness Analyst - DataQLD
- FTFull Stack Web Developer - UI/UX - .NET or JAVANSW
- FTInfrastructure Solution ArchitectSA
- CCFIS Connex Developer (Brisbane Based)Other
- CCSenior Java DeveloperNSW
- TPDigital Business Analyst | AgileQLD
- FTPerformance Reporting AnalystNSW
- CCSAP HR/ Payroll ConsultantQLD
- FTLevel 2 Service DeskNSW
- TPIT Sercurity EngineerVIC
- FTMicrosoft Dynamics AX Finance ConsultantWA
- FTSnr SOC Security Coordinator - Perm - North Ryde areaNSW
- FTUNIX / Linux EngineerNSW
- FTRegional Sales Manager - Telco/ICT - Employer of choiceQLD
- TPSenior Analytics Analyst DeveloperVIC
- FTSenior Learning Specialist - Global OrganisationQLD
- FTBI Tech Lead l Informatica ETL , Microstrategy, Hadoop, Qlikview, SalesforceNSW
- FTNetIQ Development & SupportNSW
- TPProgram ManagerNSW
- TPLevel 3 Systems EngineerWA
- FTTechnical Services EngineerNSW
- FTSenior Java EngineerACT
- TPProject Manager - eDRMSQLD