If you patched your Windows computers in 2010 against the LNK exploit used by Stuxnet and thought you were safe, researchers from Hewlett-Packard have some bad news for you: Microsoft's fix was flawed.
A collection of computer Trojans that have been used since 2009 to steal data from government agencies, military contractors, media organizations and other companies is tied to cyberespionage malware possibly created by French intelligence agencies.
A security system undergoing testing by a San-Francisco-based company aims to speed up the detection of websites and domains used for cybercrime.
Facebook wants us all to create VR content ... Lenovo tests ARM server waters with prototype ... Big data vendors find common ground ... and more tech news
An Arabic cyberespionage group has attacked thousands of high-profile targets in Egypt, Israel, Jordan and other countries for the past two years, cybersecurity vendor Kaspersky Lab said.
The Stuxnet computer worm that was used to sabotage the Iranian nuclear program was likely preceded by another sophisticated malware program that used some of the same exploits and spread through USB thumb drives to computers isolated from the Intern...
Spy group has embedded tools in foreign networks ... Sony selling its SmartEyeglasses ... Infosys will automate more jobs ... and more news
A cyberespionage group with a toolset similar to ones used by U.S. intelligence agencies has infiltrated key institutions in countries including Iran and Russia.
A still-active cybercriminal gang has stolen up to a $1 billion from banks in at least 25 countries over the last two years, infiltrating networks with malware and spying on employees' computers to facilitate large wire transfers, Kaspersky Lab said ...
Keylogging malware that may have been used by the NSA shares signficant portions of code with a component of Regin, a sophisticated platform that has been used to spy on businesses, government institutions and private individuals for years.
A new computer Trojan based on the infamous ZeuS banking malware is targeting users of over 150 banks and payment systems from around the world, security researchers warn.
A newly discovered malware program designed to infect Linux systems is tied to a sophisticated cyberespionage operation of Russian origin dubbed Epic Turla, security researchers found.
A malware program with data wiping functionality that was recently used to attack Sony Pictures Entertainment bears technical similarities to destructive malware that affected organizations in South Korea and the Middle East in the past.
After Symantec blew the lid on Regin on Sunday, computer security experts and companies are revealing information that has lead to suspicions that the U.S. and U.K. are involved.
For the first time since Stuxnet was discovered in 2010, researchers have publicly named the worm's original victims: five Iranian companies involved in industrial automation.
Gadgets & Things
Most Popular Reviews
- 1 Finally! LG OLED TV 2016 range review
- 2 Huawei Nova Plus smartphone review
- 3 Apple iPhone 7 Plus review: including Portrait Mode
- 4 Google Daydream View VR full, in-depth review
- 5 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
Join the PC World newsletter!
Latest News Articles
- 10 ways to get an IT Job in 2017
- Trump names net neutrality foe Ajit Pai to lead the FCC
- Samsung sees 2016 profit jump despite Note 7 debacle
- Microsoft expands FastTrack migration service
- Yahoo pushes back timing of Verizon deal after breaches
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- Time to ditch Foxtel and the iQ3: How to replace Foxtel packages with cheaper alternatives
- The top 10 best and worst tech gadgets and products of 2016
- TV of the year award 2016
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- FTBack End DeveloperNSW
- CCSenior Engineer - Finance PackagesQLD
- FTLinux Systems EngineerQLD
- TPSenior Business Analyst - Transformation projectsSA
- TPWeb DeveloperSA
- CCNetwork Design EngineerACT
- FTPerformance Reporting AnalystNSW
- TP.Net DeveloperVIC
- TPIT Sercurity EngineerVIC
- CCReporting AnalystVIC
- CCCloud Solution Architect - Financial Services - Continuous IntegrationNSW
- FTFull stack Developer - Senior (Java or C# and AngularJS) x 3QLD
- TPSoftware EngineerWA
- FTNode.js/API DeveloperNSW
- FTNational Manager of Security - We are looking for a strong Leader - Syd CBDNSW
- FTBusiness Development Manager - Queensland TerritoryQLD
- FTLevel 2 Service DeskNSW
- TPProject Manager - SAPQLD
- CCBusiness Project ManagerNSW
- TPProject CoordintorVIC
- CCSenior Business AnalystNSW
- TPSenior Project Manager - Digital Application CX TransformationNSW
- TPAndroid DeveloperSA
- FTPMO Coordinator - Permanent Opportunity!NSW
- FTCheckpoint Firewall and VPNNSW