If you patched your Windows computers in 2010 against the LNK exploit used by Stuxnet and thought you were safe, researchers from Hewlett-Packard have some bad news for you: Microsoft's fix was flawed.
A collection of computer Trojans that have been used since 2009 to steal data from government agencies, military contractors, media organizations and other companies is tied to cyberespionage malware possibly created by French intelligence agencies.
A security system undergoing testing by a San-Francisco-based company aims to speed up the detection of websites and domains used for cybercrime.
Facebook wants us all to create VR content ... Lenovo tests ARM server waters with prototype ... Big data vendors find common ground ... and more tech news
An Arabic cyberespionage group has attacked thousands of high-profile targets in Egypt, Israel, Jordan and other countries for the past two years, cybersecurity vendor Kaspersky Lab said.
The Stuxnet computer worm that was used to sabotage the Iranian nuclear program was likely preceded by another sophisticated malware program that used some of the same exploits and spread through USB thumb drives to computers isolated from the Intern...
Spy group has embedded tools in foreign networks ... Sony selling its SmartEyeglasses ... Infosys will automate more jobs ... and more news
A cyberespionage group with a toolset similar to ones used by U.S. intelligence agencies has infiltrated key institutions in countries including Iran and Russia.
A still-active cybercriminal gang has stolen up to a $1 billion from banks in at least 25 countries over the last two years, infiltrating networks with malware and spying on employees' computers to facilitate large wire transfers, Kaspersky Lab said ...
Keylogging malware that may have been used by the NSA shares signficant portions of code with a component of Regin, a sophisticated platform that has been used to spy on businesses, government institutions and private individuals for years.
A new computer Trojan based on the infamous ZeuS banking malware is targeting users of over 150 banks and payment systems from around the world, security researchers warn.
A newly discovered malware program designed to infect Linux systems is tied to a sophisticated cyberespionage operation of Russian origin dubbed Epic Turla, security researchers found.
A malware program with data wiping functionality that was recently used to attack Sony Pictures Entertainment bears technical similarities to destructive malware that affected organizations in South Korea and the Middle East in the past.
After Symantec blew the lid on Regin on Sunday, computer security experts and companies are revealing information that has lead to suspicions that the U.S. and U.K. are involved.
For the first time since Stuxnet was discovered in 2010, researchers have publicly named the worm's original victims: five Iranian companies involved in industrial automation.
Most Popular Reviews
- 1 Witness a 241% Australian price hike: Dell Latitude 7370 review
- 2 Is this the best value phone on the market? Moto G4 Plus review
- 3 Sony Xperia X Performance review: Sony’s most disappointing product in years
- 4 Huawei P9 review: lifting photography to another level... sometimes.
- 5 Huawei Mate 8 review: probably the best all-round Android phone you can buy
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- Cyberespionage group Patchwork sets its sights on multiple industries
- This new Outlook feature will organize your inbox for you
- Taxi hailing apps Mytaxi and Hailo will merge to counter Uber in Europe
- Cybersecurity firm offers users reimbursement for ransomware infections
- Amazon testing parcel deliveries by drones in the UK
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTSocial Media AssistantQLD
- CCSenior Data ArchitectNSW
- CC.Net DeveloperACT
- CCDesktop Engineer (SCCM/SOE)WA
- CCInfrastructure Project ManagerACT
- FTMobility Test AnalystNSW
- CCContract IT Assistant (Office Automation/PC LAN) 160802/ITA/991Asia
- CCPortfolio AnalystVIC
- CCCRM DeveloperACT
- CCProject CoordinatorACT
- CCEnvironment ManagerVIC
- CCSenior Architect - CloudVIC
- CCProject Manager- Infrastructure and App Roles- Gov BackgroundNSW
- CCApplication Service TechnicianVIC
- CCMicrosoft Business Intelligence (BI) ConsultantNSW
- CCProject Engineer -VIC
- CCLead Business AnalystNSW
- CCBusiness Analyst - CloudVIC
- CCSenior Business Systems AnalystVIC
- CCAgile Performance Tester- Bamboo, Jenkins, Confluence, JiraNSW
- FTProject Manager- Change ManagementSA
- CCBusiness Analyst / BillingNSW
- FTDefence Network Architect | NV2ACT
- CCSenior Process Analyst - Sydney CBDNSW
- FTSAP FS-PM/FS-PQM SpecialistVIC