A malicious software tool perhaps most famously used to hack RSA's SecurID infrastructure is still being used in targeted attacks, according to security vendor FireEye.
A new variant of the Ramnit financial malware is using local Web browser injections in order to steal log-in credentials for Steam accounts, according to researchers from security firm Trusteer.
The capabilities of malware targeting the market-leading Android platform are mimicking those of Trojans that have wrung profits from Windows PC users for years, a new study shows.
Cybercriminals were quick to integrate a newly released exploit for a Java vulnerability patched in June into a tool used to launch mass attacks against users, an independent malware researcher warned.
Cybercriminals are controlling malware on Android devices through a Google service that enables developers to send messages to their applications, according to security researchers from antivirus vendor Kaspersky Lab.
Internet Explorer proved to be the biggest security concern for Microsoft in the last month, with the browser spurring 11 of the 19 critical vulnerabilities the company issued in August's "Patch Tuesday" set of software fixes.
Mobile ad networks can provide a loophole to serve malware to Android devices, according to researchers from security firm Palo Alto Networks who have found new Android threats being distributed in this manner.
The Chinese hacker group that broke into the computer network of The New York Times and other high-profile organizations, including defense contractors, has launched new attacks following a few months of inactivity, according to researchers from secu...
The TOR Project is advising that people stop using Windows after the discovery of a startling vulnerability in Firefox that undermined the main advantages of the privacy-centered network.
The Windows 8 Secure Boot mechanism can be bypassed on PCs from certain manufacturers because of oversights in how those vendors implemented the Unified Extensible Firmware Interface (UEFI) specification, according to a team of security researchers.
Bitdefender has released a Windows application designed to help users secure sensitive Web-browsing sessions, especially when they shop or bank online. The application is called Safepay and a free version is available to home users.
Microsoft estimates that 88 percent of botnets running the Citadel financial malware were disrupted as a result of a takedown operation launched by the company in collaboration with the FBI and partners in technology and financial services. The opera...
Malware writers are increasingly considering the Tor anonymity network as an option for hiding the real location of their command-and-control (C&C) servers, according to researchers from security firm ESET.
Citadel malware is installed on over 20,000 PCs in Japan and actively sending financial information it harvests to servers abroad, according to security software vendor Trend Micro.
An increasing number of Android phones are infected with mobile malware programs that are able to turn the handsets into spying devices, according to a report from Kindsight Security Labs, a subsidiary of telecommunications equipment vendor Alcatel-L...
Most Popular Reviews
- 1 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 2 D-Link Taipan AC3200 Ultra tri-band modem-router review
- 3 Dell XPS 13 (2016) review: Making the very best Ultrabook
- 4 Microsoft Surface Book review: The verdict on Microsoft's first notebook
- 5 Telstra Wi-Fi 4GX Advanced III review: Testing the world's first 600Mbps wireless hotspot
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- Apple hires mobile encryption pioneer amid encryption debate
- Asus ROG teases a massive gaming notebook that outperforms Titan X
- HPE is spinning out its huge services business and merging it with CSC
- Tech woes hamper jury in Oracle case aginst Google
- Cisco's Meraki spreads its cloud to voice
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCTechnical PM - Magento E-Commerce SolutionNSW
- CCSystems Analyst (HTML/JAVA/Wireless & Mobile) 160525/SA/443Asia
- CCProject/ Change ManagerQLD
- CCEnd to End Project Manager - PMO and GovernanceVIC
- FTNetwork SpecialistVIC
- CCContract Analyst Programmer (.NET C#/MS ASP .NET) 160526/AP/263Asia
- FTGraduate IT Support OfficerNSW
- CCQA OfficerACT
- CCPositive Vetted ICT positions - Defence intelligence and information securityACT
- FTNV1, NV2 Network Engineers | Permanent role with diverse Defence projectsACT
- CCIteration Manager/Agile Project ManagerNSW
- CCSystems Engineer - NV2ACT
- CCContract Programmer (MS SQL Server/SQL/Web) 160518/P/626Asia
- FTBusiness Systems AnalystNSW
- CCIT Security Consultant -NSW
- CCJava DeveloperACT
- FTProduction ConsultantVIC
- CCContract Analyst Programmer (IT Application/.Net) 160523/AP/254Asia
- CCSenior Process AnalystVIC
- FTSenior Programmer (Data Engineering)NSW
- CCSnr Technology Analyst Disaster RecoveryVIC
- CCSoftware DevelopersACT
- CCOracle DBA | 3-6mth ContractVIC
- CCChange manager/Change LeadNSW
- CCSenior IT Security Specialist-SANS, ISC2, ISACA, ITILNSW