If you patched your Windows computers in 2010 against the LNK exploit used by Stuxnet and thought you were safe, researchers from Hewlett-Packard have some bad news for you: Microsoft's fix was flawed.
A collection of computer Trojans that have been used since 2009 to steal data from government agencies, military contractors, media organizations and other companies is tied to cyberespionage malware possibly created by French intelligence agencies.
A security system undergoing testing by a San-Francisco-based company aims to speed up the detection of websites and domains used for cybercrime.
Facebook wants us all to create VR content ... Lenovo tests ARM server waters with prototype ... Big data vendors find common ground ... and more tech news
An Arabic cyberespionage group has attacked thousands of high-profile targets in Egypt, Israel, Jordan and other countries for the past two years, cybersecurity vendor Kaspersky Lab said.
The Stuxnet computer worm that was used to sabotage the Iranian nuclear program was likely preceded by another sophisticated malware program that used some of the same exploits and spread through USB thumb drives to computers isolated from the Intern...
Spy group has embedded tools in foreign networks ... Sony selling its SmartEyeglasses ... Infosys will automate more jobs ... and more news
A cyberespionage group with a toolset similar to ones used by U.S. intelligence agencies has infiltrated key institutions in countries including Iran and Russia.
A still-active cybercriminal gang has stolen up to a $1 billion from banks in at least 25 countries over the last two years, infiltrating networks with malware and spying on employees' computers to facilitate large wire transfers, Kaspersky Lab said ...
Keylogging malware that may have been used by the NSA shares signficant portions of code with a component of Regin, a sophisticated platform that has been used to spy on businesses, government institutions and private individuals for years.
A new computer Trojan based on the infamous ZeuS banking malware is targeting users of over 150 banks and payment systems from around the world, security researchers warn.
A newly discovered malware program designed to infect Linux systems is tied to a sophisticated cyberespionage operation of Russian origin dubbed Epic Turla, security researchers found.
A malware program with data wiping functionality that was recently used to attack Sony Pictures Entertainment bears technical similarities to destructive malware that affected organizations in South Korea and the Middle East in the past.
After Symantec blew the lid on Regin on Sunday, computer security experts and companies are revealing information that has lead to suspicions that the U.S. and U.K. are involved.
For the first time since Stuxnet was discovered in 2010, researchers have publicly named the worm's original victims: five Iranian companies involved in industrial automation.
Gadgets & Things
Most Popular Reviews
- 1 Finally! LG OLED TV 2016 range review
- 2 Google Daydream View VR full, in-depth review
- 3 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
- 4 Apple iPhone 7 Plus review: including Portrait Mode
- 5 MSI GS70 laptop review
Join the PC World newsletter!
Latest News Articles
- U.S. and U.K. spy agencies have been intercepting in-flight phone calls for years
- Samsung still struggling with the recovery of Note7 phones from users
- Intel, Microsoft renew 'Wintel' partnership with Project Evo and VR specs for PCs
- New Windows 10 Insider Build allows you to shut down your PC with your voice
- Microsoft wants to enable cellular PCs, but will carriers bite?
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- The top 10 best and worst tech gadgets and products of 2016
- TV of the year award 2016
- Best phone of the year 2016
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- FTPMO Lead/ ManagerVIC
- CCSenior Test EngineerACT
- FTWeb Developer/ DesignerQLD
- FTData Integration or Big Data Specialist (Sales) - Permanent - SydneyNSW
- FTBusiness Intelligence Technical AnalystVIC
- CCTechnology Specialist-AWS MigrationNSW
- CCWeb Designer or Visual Interactional DesignerNSW
- CCTechnical Security LeadVIC
- FTFront End DeveloperVIC
- CCSenior Web Content AuthorACT
- CCSenior UX DesignerNSW
- FTProject Manager (Cyber Security) - Permanent - IT Services - North Ryde areaNSW
- CCSEM / PPC / Paid Search Specialist - 6 Month Contract RoleNSW
- FTRF EngineerNSW
- CCWindows 365 Engineer - start ASAPNSW
- CCSenior Automation TesterVIC
- FTTechnical Business AnalystQLD
- TPSenior Project AnalystNSW
- FTProject Manager - Security Operations CentreVIC
- CCSecurity LeadNSW
- CCActive Directory Engineer l Design & SupportNSW
- FTSenior Project EngineerNSW
- CCPlatform Services EngineerNSW
- CCSenior Software Engineer/ArchitectVIC
- CCVBA DeveloperNSW