Android malware is following in the footsteps of Windows malware with attackers adopting some of the same distribution and monetization techniques despite the major differences between the platforms.
The spike in the number of clients using the Tor anonymity network was likely caused by a botnet, according to Tor and third-party security researchers.
Following through on an order earlier this year from U.S. President Barack Obama, the National Institute of Standards and Technology (NIST) is rapidly developing a set of guidelines and best practices to help organizations better secure their IT syst...
The cyberattack that resulted in nytimes.com and some other high-profile websites being inaccessible to a large number of users Tuesday started with a targeted phishing attack against a reseller for Melbourne IT, an Australian domain registrar and IT...
Recent versions of Orbit Downloader, a popular Windows program for downloading embedded media content and other types of files from websites, turns computers into bots and uses them to launch distributed denial-of-service (DDoS) attacks, according to...
A malicious software tool perhaps most famously used to hack RSA's SecurID infrastructure is still being used in targeted attacks, according to security vendor FireEye.
A new variant of the Ramnit financial malware is using local Web browser injections in order to steal log-in credentials for Steam accounts, according to researchers from security firm Trusteer.
The capabilities of malware targeting the market-leading Android platform are mimicking those of Trojans that have wrung profits from Windows PC users for years, a new study shows.
Cybercriminals were quick to integrate a newly released exploit for a Java vulnerability patched in June into a tool used to launch mass attacks against users, an independent malware researcher warned.
Cybercriminals are controlling malware on Android devices through a Google service that enables developers to send messages to their applications, according to security researchers from antivirus vendor Kaspersky Lab.
Internet Explorer proved to be the biggest security concern for Microsoft in the last month, with the browser spurring 11 of the 19 critical vulnerabilities the company issued in August's "Patch Tuesday" set of software fixes.
Mobile ad networks can provide a loophole to serve malware to Android devices, according to researchers from security firm Palo Alto Networks who have found new Android threats being distributed in this manner.
The Chinese hacker group that broke into the computer network of The New York Times and other high-profile organizations, including defense contractors, has launched new attacks following a few months of inactivity, according to researchers from secu...
The TOR Project is advising that people stop using Windows after the discovery of a startling vulnerability in Firefox that undermined the main advantages of the privacy-centered network.
The Windows 8 Secure Boot mechanism can be bypassed on PCs from certain manufacturers because of oversights in how those vendors implemented the Unified Extensible Firmware Interface (UEFI) specification, according to a team of security researchers.
Most Popular Reviews
- 1 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
- 2 Sony Xperia XZ review: turbo-charged last-gen phone
- 3 Hisense Series 7 ULED 4K UHD TV review
- 4 Sony X9300D and X8500D UHD 4K TV review
- 5 Moto X Force review: Leading features from a mid-range phone
Join the PC World newsletter!
Latest News Articles
- Gallipoli is now an amazing video game
- U.S. indicts Russian for hacking LinkedIn, Dropbox, Formspring
- An IoT botnet is partly behind Friday's massive DDOS attack
- Bankers plan to give Corda blockchain code to Hyperledger project
- Easy-to-exploit rooting flaw puts Linux computers at risk
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- Google Pixel XL full, in-depth smartphone review: The new best Android phone
- Japan Robot, gadget and car expo slideshow
- Panasonic DX900U UHD 4K smart TV review: Best all-round TV ever?
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- FTBiomedical Project ManagerSA
- CCBusiness AnalystACT
- CCContract Senior Systems Analyst (J2EE/JAVA/Web) 161012/SSA/552Asia
- FTSOE ArchitectNSW
- FTSoftware Developers - .Net 4.6NSW
- CCAcquisition Marketing Executive - B2BNSW
- CCContract IT Assistant (PC LAN Support) 161114/ITA/411Asia
- CCCloud Security Services SpecialistVIC
- CCResident Engineer - Nexus 2K, 5K, 7K & 9KNSW
- CCFront End Developer (UI) - 12 Month ContractNSW
- CCField EngineerVIC
- FTTechnical Support Engineer | Cloud | Automation techsNSW
- CCContract IT Assistant (Office Automation) 161031/ITA/541Asia
- FTData AnalystNSW
- FTDelivery LeadNSW
- CCResident Operation Support Engineer (Renewable Contract)Asia
- PTService Management AnalystSA
- CCContract Management SpecialistNSW
- FTSolution ArchitectACT
- CCStrategy AnalystVIC
- CCEnterprise ArchitectNSW
- CCInfrastructure & Security Solution ArchitectVIC
- CCJava DeveloperNSW