Trend Micro is warning of a phishing campaign touting a "Heartbleed removal" tool, a nonsensical product that is actually malicious software.
The Secure Boot security mechanism of the Unified Extensible Firmware Interface (UEFI) can be bypassed on around half of computers that have the feature enabled in order to install bootkits, according to a security researcher.
Like a crowbar, security software tools can be used for good and evil.
A suspected Iranian hacker group seeded Facebook and LinkedIn with bogus profiles of attractive women and even created a fake online news organization to get digitally closer to more than 2,000 people whom it wanted to spy on.
Popular file and URL scanning service VirusTotal released a new application that allows Mac OS X users to scan suspicious files with more than 50 antivirus engines supported by the service.
A new computer Trojan that targets users of 450 financial institutions from around the world appears to borrow functionality and features directly from the notorious Zeus and Carberp malware programs.
Security researchers uncovered a global cybercriminal operation that infected with malware almost 1,500 point-of-sale (POS) terminals, accounting systems and other retail back-office platforms from businesses in 36 countries.
Despite a leak of its source code, an Android program aimed at compromising online bank accounts is still commanding US$5,000 per copy, one of the highest prices seen for a type of malware, according to research from Symantec.
Microsoft Silverlight vulnerabilities are increasingly being exploited in drive-by download attacks to infect computers with malware, especially through malicious ads.
Symantec's latest product, Norton Small Business, is perhaps the most well-rounded offering the company has inserted into its product array for small companies.
A U.S. criminal indictment against Chinese Army personnel over alleged hacking describes how stolen intellectual property was funneled to Chinese companies, an unresolved question for analysts.
Law enforcement agencies from 16 countries on three continents last week arrested 97 people after executing raids targeting those suspected of creating, buying and using a notorious Trojan program called BlackShades.
Last month Google offered refunds to users who bought a fake antivirus app from Google Play, but the scam seems to be catching on and security researchers have recently identified similar apps in both the Android and Windows Phone app stores.
Further investigation into an exploit kit known as "Elderwood" shows the attackers using it are more numerous and possibly better funded than previously thought, according to new research from Symantec.
The current state of online advertising endangers the security and privacy of users and the U.S. Federal Trade Commission should force the industry to offer better protections through comprehensive regulation, the U.S. Senate said in a report.
Most Popular Reviews
- 1 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 2 D-Link Taipan AC3200 Ultra tri-band modem-router review
- 3 Dell XPS 13 (2016) review: Making the very best Ultrabook
- 4 Microsoft Surface Book review: The verdict on Microsoft's first notebook
- 5 Telstra Wi-Fi 4GX Advanced III review: Testing the world's first 600Mbps wireless hotspot
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- Toy maker Maisto’s website pushed growing CryptXXX ransomware threat
- Here's why analytics is eating the supply chain
- Rovi to acquire TiVo for $1.1 billion
- Phishing apps posing as popular payment services infiltrate Google Play
- Sky Muster gets a user guide
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCSenior Enterprise Architect - eCommerceVIC
- CCSystem AnalystNSW
- CCMicrosoft Server EngineerWA
- CCBusiness AnalystSA
- CCContract Programmer (Crystal Report/HTML/SQL) 160428/P/244Asia
- CCSenior ICT Project OfficerACT
- FTProject Manager | Permanent role in Canberra | NV1/2 clearedACT
- CCSenior Automation Tester - MicroservicesNSW
- CCSenior Front End / UI Developer (React.js / LESS / SASS)NSW
- CCSystem Administration / Application Support | NV2 clearance neededACT
- CCITIL Environment, Configuration, Release Manager- Banking/GovtNSW
- CCSr. Project Manager - Six SigmaVIC
- CCNV2 - System Administration / Application SupportACT
- CCWeb AdministratorACT
- FTJunior Inside Sales Rep | National systems integrator & MSP | $60-70K+NSW
- FTDigital Project ManagerVIC
- CCContract Programmer (JAVA/HTML/SQL) 160421/P/903Asia
- CCAnalyst Programmer (Lotus Notes/Networking) 160504/AP/781Asia
- FTLevel 2 IT Field Systems Engineer/Administrator - Multiple opportunitiesNSW
- CCSenior Oracle DBA- Part time 20 hoursWA
- CCUser Experience ExpertVIC
- FTTechnical Business Analyst - BINSW
- FTDigital Account Manager - Online MediaNSW
- CCContract Snr IT Assistant (IT Operation/UNIX) 160504/SITA/982Asia
- CCTest Analyst - Contact Centre TechnologiesVIC