One of the zero-day flaws patched by Microsoft on Tuesday had been used for some time by a group with suspected Chinese government ties that targets technology companies, CrowdStrike's chief executive said.
A cyberespionage group operating out of Russia has launched malware attacks against the Ukrainian government and at least one U.S.-based organization through a previously unknown vulnerability that affects most versions of Windows.
Four websites promoting democracy in Hong Kong have been rigged to deliver malicious software, according to a Washington, D.C.-based security company.
Sears Holding Corp. said Friday the payment systems at its Kmart retail chain had been breached as a result of malware, compromising shoppers' credit and debit card numbers.
Shellshock continues to reverberate: Attackers are exploiting recently discovered vulnerabilities in the Bash command-line interpreter in order to infect Linux servers with a sophisticated malware program known as Mayhem.
Dairy Queen said Thursday the "Backoff" point-of-sale malware infected systems at 395 of its stores, stealing payment card data.
A Russian man accused of hacking point-of-sale systems in the U.S. is facing additional charges following a revised indictment returned by a grand jury on Thursday, the U.S. Department of Justice said.
A new version of an Android worm called Selfmite has the potential to ramp up huge SMS charges for victims in its attempt to spread to as many devices as possible.
A leaked programming manual for interacting with the physical components of automated teller machines might have helped attackers create malware programs that were used to steal cash from ATMs in various parts of the world this year.
A mistake by a suspected Russian-speaking cybercriminal group allowed a security vendor to peep on a campaign that stole login credentials for hundreds of thousands of online bank accounts.
Criminals have stolen millions of dollars from ATMs worldwide using a specialized malware program that forces the machines to dispense cash on command.
In a gambit aimed at driving manufacturers to beef up protections for USB flash drive firmware, two security researchers have released a collection of tools that can be used to turn those drives into silent malware installers.
FireEye has detected Shellshock attacks against network-attached storage devices made by Taipei-based QNAP and used by universities and research institutes in Korea, Japan and the U.S.
Musicians dominate the 2014 list of celebs you might not want to search on for fear of malware
A malware program that targets Hong Kong activists using Apple devices has trademarks of being developed by a nation-state, possibly China, according to a security company.
Most Popular Reviews
- 1 Hisense Series 7 ULED 4K UHD TV review
- 2 Samsung Galaxy Note 7 review
- 3 Portable power: Venom Blackbook 13 Zero review
- 4 Alcatel Idol 4S review: King of the mid-range?
- 5 Samsung Galaxy S7 Edge Review
Join the PC World newsletter!
Latest News Articles
- You can now use an iPhone to log into a Windows 10 PC, Microsoft says
- Android malware that can infiltrate corporate networks is spreading
- Firefox blocks websites with vulnerable encryption keys
- Ransomware spreads through weak remote desktop credentials
- Linksys EA9500 Max-Stream AC5400 MU-MIMO Gigabit router review
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTSenior PHP DeveloperNSW
- CCLAN ConsultantWA
- CCBusiness Analyst with change management experienceACT
- CCAcquisition Marketing Executive - B2BNSW
- FTPositive Vetted ICT positions - Defence intelligence and information securityACT
- FTTest SpecialistSA
- FTScrum Master | High Profile FintechNSW
- FTEMC Storage ConsultantWA
- FTOutbound TelesalesVIC
- CCSolution ArchitectQLD
- CCInfrastructure Project Manager - DCR ProjectNSW
- FTOutbound TelesalesVIC
- FTTeam Leader Full Stack, Python, FinanceNSW
- CCSenior .NET DeveloperVIC
- CCE-Commerce - Senior Web DeveloperNSW
- CCNetwork and Security EngineerNSW
- CCContract Web Developer (160915/WD/vmp)Asia
- CCIT Security ArchitectACT
- CCSenior Change ManagerVIC
- CCBI Reporting AnalystACT
- FTTechnical Business Analyst | Marketing ServicesNSW
- FTCustomer Solutions Engineer | Voice | Data | TelcoNSW
- CCSoftware TesterACT
- FTOutbound TelesalesVIC
- FTSenior Project Manager | TelecommunicationVIC