If you patched your Windows computers in 2010 against the LNK exploit used by Stuxnet and thought you were safe, researchers from Hewlett-Packard have some bad news for you: Microsoft's fix was flawed.
A collection of computer Trojans that have been used since 2009 to steal data from government agencies, military contractors, media organizations and other companies is tied to cyberespionage malware possibly created by French intelligence agencies.
A security system undergoing testing by a San-Francisco-based company aims to speed up the detection of websites and domains used for cybercrime.
Facebook wants us all to create VR content ... Lenovo tests ARM server waters with prototype ... Big data vendors find common ground ... and more tech news
An Arabic cyberespionage group has attacked thousands of high-profile targets in Egypt, Israel, Jordan and other countries for the past two years, cybersecurity vendor Kaspersky Lab said.
The Stuxnet computer worm that was used to sabotage the Iranian nuclear program was likely preceded by another sophisticated malware program that used some of the same exploits and spread through USB thumb drives to computers isolated from the Intern...
Spy group has embedded tools in foreign networks ... Sony selling its SmartEyeglasses ... Infosys will automate more jobs ... and more news
A cyberespionage group with a toolset similar to ones used by U.S. intelligence agencies has infiltrated key institutions in countries including Iran and Russia.
A still-active cybercriminal gang has stolen up to a $1 billion from banks in at least 25 countries over the last two years, infiltrating networks with malware and spying on employees' computers to facilitate large wire transfers, Kaspersky Lab said ...
Keylogging malware that may have been used by the NSA shares signficant portions of code with a component of Regin, a sophisticated platform that has been used to spy on businesses, government institutions and private individuals for years.
A new computer Trojan based on the infamous ZeuS banking malware is targeting users of over 150 banks and payment systems from around the world, security researchers warn.
A newly discovered malware program designed to infect Linux systems is tied to a sophisticated cyberespionage operation of Russian origin dubbed Epic Turla, security researchers found.
A malware program with data wiping functionality that was recently used to attack Sony Pictures Entertainment bears technical similarities to destructive malware that affected organizations in South Korea and the Middle East in the past.
After Symantec blew the lid on Regin on Sunday, computer security experts and companies are revealing information that has lead to suspicions that the U.S. and U.K. are involved.
For the first time since Stuxnet was discovered in 2010, researchers have publicly named the worm's original victims: five Iranian companies involved in industrial automation.
Most Popular Reviews
- 1 Huawei P9 review: lifting photography to another level... sometimes.
- 2 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 3 D-Link Taipan AC3200 Ultra tri-band modem-router review
- 4 Dell XPS 13 (2016) review: Making the very best Ultrabook
- 5 Microsoft Surface Book review: The verdict on Microsoft's first notebook
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- Your slice of the Windows 10 birthday cake
- Review: Arcam MusicBoost for iPhone 6 and 6S
- How to reinstall Windows like a pro
- Intel mulls selling its security business
- Former NBN CEO joins Tony Windsor on campaign trail
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCDigital Business AnalystVIC
- CCDynamics CRM DeveloperNSW
- CCContract Analyst Programmer (J2EE/JAVA/Oracle) 160617/AP/025Asia
- FTSystems application support analystNSW
- FTProject Manager - Insurance experience neededNSW
- CCBusiness Analyst - Asset ManagementNSW
- CCSnr IT Project Manager - Contact CentreVIC
- FTBusiness Analyst/Data Analyst Capability ManagerVIC
- CCLead Communications ConsultantWA
- FTTechnical COE SpecialistACT
- CCNetwork EngineerVIC
- CCSAP PI/PO ConsultantVIC
- FTSystems Analyst - ERPNSW
- CCTenable Security - Technical ConsultantVIC
- CCContract Analyst Programmer (J2EE/JAVA/SQL) 160621/AP/082Asia
- CCInfrastructure ArchitectACT
- CCInside Sales Specialist / Customer Service - TelecommunicationsNSW
- CCSAP Financial Master DataACT
- FTSenior Architect, TechnologyNSW
- FTTechnical Support - ImplementationsVIC
- CCTibco DeveloperWA
- FTFront End .Net Developer (.Net / Angular / Bootstrap)NSW
- CCWindows 2003-2012 R2 Active Directory Consultant/ManagerNSW
- CCETL Developer - Tableau FocusNSW
- CCProject ManagerNSW