Many people will know what it’s like to regularly click ‘close’ on the nagging Windows 10 ‘upgrade’ notification. It’s been happening every day for many months. But apparently something on one of these hundreds of fade-into-the-background notificatio...
PDF files are one of the most common, and most trusted document formats out there. However, that trust, combined with the cross-platform use of PDFs makes the Adobe file format one of the most targeted and exploited by malicious attacks as well.
Perhaps you've heard that the Apple Mac OS X operating system is simply more secure by design and not prone to the security flaws and vulnerabilities that plague the dominant Microsoft Windows operating system? Well, don't believe the hype. Apple unl...
Rootkits, a type of stealth technology used by malware malefactors, attempt to hide in the dark corners of an infected PC and evade detection. A new post out today from the Microsoft Malware Protection Center shines the spotlight on the evil tools.
2009 ushered in mobile malware with the first (and second) iPhone worm appearing just before Christmas.
On 26 June, Kaspersky Lab held its 10th annual Virus Analysts Summit in Dubrovnik, Croatia. At the event the company's chief security researchers discussed the latest online threats to target businesses and consumers.
Creators of Waledac malware enlisted the Conficker botnet as a tool to spread malware of their own, marking the first time Conficker was made available for hire, according to Cisco's mid-year security report.This was symptomatic of a wider trend Cisc...
In 1989, Eugene Kaspersky ran afoul of the Cascade virus while working for the Ministry of Defence in the heart of the Soviet Union. He defeated it with his wits and a pencil.
Forewarned is forearmed. We investigate the latest and most deadly tech dangers, and explain how to fight back.
Hey, we can't all have careers at Google. Sometimes when you work in IT, you have to hold your nose and hope for the best.
Here are our picks for no-cost ways to protect your PC, including Avast Home Edition, SpywareBlaster, and more.
Your PC's operating system is under constant threat of invasion, whether the attacker's aim is to spread malicious malware or to convince you to buy protective software that is really just a rip-off. Here's how to stand guard.
Few tears were shed when McColo, a US-based company that allegedly hosted systems for prolific purveyors of spam, malware and child pornography, was suddenly taken offline by its upstream service providers on November 11.
As a small-business person, you might bemoan the fact you don't have 24/7 IT support like your larger-scale competitors. Don't panic. You can solve many of the most common computer problems yourself. Here are some snafus you can tackle on your own, t...
Frank Boldewin had seen a lot of malicious software in his time, but never anything like Rustock.C.
Most Popular Reviews
- 1 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 2 D-Link Taipan AC3200 Ultra tri-band modem-router review
- 3 Dell XPS 13 (2016) review: Making the very best Ultrabook
- 4 Microsoft Surface Book review: The verdict on Microsoft's first notebook
- 5 Telstra Wi-Fi 4GX Advanced III review: Testing the world's first 600Mbps wireless hotspot
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- 'Black box' no more: This system can spot the bias in those algorithms
- Senators want warrant protections for US email stored overseas
- Celebrity hacker Guccifer's confession gives us all a lesson in security
- IoT security is getting its own crash tests
- Telstra wins National Cancer Screening Register contract
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTVMWare Infrastructure EngineerVIC
- CCRelease Manager, SAPNSW
- CCSenior IT Security Specialist-SANS, ISC2, ISACA, ITILNSW
- CCData Feeds Developer | Financial Services | C# & SQLNSW
- CCechnical Specialist ApplicationsACT
- CCTransition Manager / Project ManagerQLD
- FTAX Lead Technical ConsultantNSW
- CCProject Manager/Iteration ManagerVIC
- CCIT Environment and Deployment SpecialistQLD
- FTApplication Support EngineerVIC
- CCService Desk ConsultantACT
- CCiOS Developer x 2NSW
- CCChange Manager - SAP FinanceNSW
- CCOracle DBA | 3-6mth ContractVIC
- CCDevOps Software Configuration ManagerACT
- CCContract Analyst Programmer (.NET C#/MS ASP .NET) 160526/AP/263Asia
- CCContract Programmer (HTML/JAVA/SQL) 160525/P/013Asia
- CCSenior Business AnalystVIC
- CCDigital Business Analyst (iOS & Android / Web Projects)NSW
- CCBusiness Analyst, Service Performance, RetailNSW
- CCTechnical Service LeadNSW
- CCOpen Source Specialist / Senior ConsultantQLD
- CCContract Analyst Programmer (IT Application/.Net) 160523/AP/254Asia
- CCContract Analyst Programmer (JAVA/J2EE/Oracle) 160523/AP/254Asia
- CCDeemed Order Business SpecialistVIC