Neiman Marcus apologized on Thursday for a data breach that compromised payment card numbers, saying Social Security numbers and birth dates appear to be safe.
The stolen credit card numbers of millions of Target shoppers took an international trip -- to Russia.
Microsoft's "Patch Tuesday" set of monthly software patches is so minimal for January that at least one security firm is suggesting that IT shops first tend to recently issued patches for more severe vulnerabilities found in Oracle Java, Adobe Flash ...
What's the downside to successfully stealing 40 million credit card numbers from Target? Trying to sell the data.
The CEO of retailer Target revealed Saturday in an interview that the company's point-of-sale (PoS) systems were infected with malware, confirming what security experts suspected since the massive data breach was announced in mid-December.
A deeper look by Cisco Systems into the cyberattack that infected Yahoo users with malware appears to show a link between the attack and a suspicious affiliate traffic-pushing scheme with roots in Ukraine.
Land-based terminals that send data to satellites may pose a soft target for hackers, an analysis from a computer security firm shows.
A new Trojan program is targeting users of the popular online role-playing game World of Warcraft and is capable of hijacking accounts even if their owners use two-factor authentication.
A team of malware developers is preparing to sell a new ransomware program that encrypts files on infected computers and asks victims for money to recover them, according to a volunteer group of security researchers who tracked the development of the...
A new malware program that functions as a module for the Apache and Nginx Web servers is being sold on cybercrime forums, according to researchers from security firm IntelCrawler.
Most webcams have a warning light that indicates when they're active, but it's possible for malware to disable this important privacy feature on older Mac computers, according to research from Johns Hopkins University (JHU) in Baltimore.
Attackers are compromising Linux and Windows systems to install a new malware program designed for launching distributed denial-of-service (DDoS) attacks, according to researchers from the Polish Computer Emergency Response Team (CERT Polska).
An Android botnet found in South Korea that steals text messages may be one of the largest and most advanced mobile malware operations discovered, according to security vendor FireEye.
Attackers exploited a vulnerability in Adobe ColdFusion to install data-stealing malware that works as a module for Microsoft's Internet Information Services (IIS) Web server software.
A fake antivirus program in circulation uses at least a dozen stolen digital code-signing certificates, indicating cybercriminals are increasingly breaching the networks of software developers, Microsoft wrote on Sunday.
Most Popular Reviews
- 1 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
- 2 Sony Xperia XZ review: turbo-charged last-gen phone
- 3 Hisense Series 7 ULED 4K UHD TV review
- 4 Sony X9300D and X8500D UHD 4K TV review
- 5 Moto X Force review: Leading features from a mid-range phone
Join the PC World newsletter!
Latest News Articles
- Yet another Apple dongle: Apple Thunderbolt 3 (USB-C) to Thunderbolt 2 Adapter now available
- Meet Apple’s complete MacBook lineup
- 7 technologies killed in Apple's new MacBook Pro
- Here’s how Photoshop will work with the new MacBook Pro Touch Bar
- TP-Link Smart Wi-Fi LED Bulb LB130 review: An inexpensive color option
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- Google Pixel XL full, in-depth smartphone review: The new best Android phone
- Japan Robot, gadget and car expo slideshow
- Panasonic DX900U UHD 4K smart TV review: Best all-round TV ever?
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- CCAccounts Payable/Contract Officer- NSW Government backgroundNSW
- FTFrontend DeveloperNSW
- CCMultiple Opportunities - Baseline, NV1 or NV2SA
- FTDevelopment Manager - Web, Mobile and CMSNSW
- CCSAP GRC ConsultantACT
- CCInfrastructure Specialist :SCOMWA
- CCBusiness AnalystNSW
- CCTest Engineer - .NETNSW
- CCService Desk ConsultantNSW
- TPProject ManagerVIC
- FTLua DeveloperVIC
- FTQA - Business Development Lead (IT)Asia
- CCSoftware Engineer- Linux and DevOpsNSW
- CCPHP DeveloperNSW
- CCContract Analyst Programmer (JAVA/SQL/Web) 161026/AP/632Asia
- FTBusiness Analyst - PermanentACT
- CCProject Reporting Officer - Tabelau exp - 6 mth contract - Nth SydneyNSW
- CCSenior / Lead UX DesignerNSW
- CCSenior Business Analyst - experience in IDAM a MUSTNSW
- FTMicrosoft Dynamics AX Manufacturing ConsultantSA
- FTPeopleSoft Business Analyst x 2QLD
- FTNetwork Support SpecialistACT
- FTInsights AnalystNSW
- CCContract Senior IT Assistant (Lotus Notes) 161101/SITA/571Asia