South Korean organizations that conduct research on international affairs, national security and Korean unification are under siege from cyberspies whose attack may have its origins in North Korea.
Android malware is following in the footsteps of Windows malware with attackers adopting some of the same distribution and monetization techniques despite the major differences between the platforms.
The spike in the number of clients using the Tor anonymity network was likely caused by a botnet, according to Tor and third-party security researchers.
Following through on an order earlier this year from U.S. President Barack Obama, the National Institute of Standards and Technology (NIST) is rapidly developing a set of guidelines and best practices to help organizations better secure their IT syst...
The cyberattack that resulted in nytimes.com and some other high-profile websites being inaccessible to a large number of users Tuesday started with a targeted phishing attack against a reseller for Melbourne IT, an Australian domain registrar and IT...
Recent versions of Orbit Downloader, a popular Windows program for downloading embedded media content and other types of files from websites, turns computers into bots and uses them to launch distributed denial-of-service (DDoS) attacks, according to...
A malicious software tool perhaps most famously used to hack RSA's SecurID infrastructure is still being used in targeted attacks, according to security vendor FireEye.
A new variant of the Ramnit financial malware is using local Web browser injections in order to steal log-in credentials for Steam accounts, according to researchers from security firm Trusteer.
The capabilities of malware targeting the market-leading Android platform are mimicking those of Trojans that have wrung profits from Windows PC users for years, a new study shows.
Cybercriminals were quick to integrate a newly released exploit for a Java vulnerability patched in June into a tool used to launch mass attacks against users, an independent malware researcher warned.
Cybercriminals are controlling malware on Android devices through a Google service that enables developers to send messages to their applications, according to security researchers from antivirus vendor Kaspersky Lab.
Internet Explorer proved to be the biggest security concern for Microsoft in the last month, with the browser spurring 11 of the 19 critical vulnerabilities the company issued in August's "Patch Tuesday" set of software fixes.
Mobile ad networks can provide a loophole to serve malware to Android devices, according to researchers from security firm Palo Alto Networks who have found new Android threats being distributed in this manner.
The Chinese hacker group that broke into the computer network of The New York Times and other high-profile organizations, including defense contractors, has launched new attacks following a few months of inactivity, according to researchers from secu...
The TOR Project is advising that people stop using Windows after the discovery of a startling vulnerability in Firefox that undermined the main advantages of the privacy-centered network.
Epson EcoTank Expression ET-2500
Linksys AC5400 MU-MIMO Gigabit router
UE Boom 2 Bluetooth speaker
Microsoft L5V-00027 Sculpt Ergonomic Keyboard Desktop
Everki ContemPRO Roll Top Laptop Backpack
Smart LED Bulb LB130
Samsung portable 1TB T3 drive
Lexar® JumpDrive® S57 USB 3.0 flash drive
Epson WorkForce ET-4550
Belkin MIXIT Metallic Lightning to USB Cable
Acer Swift 7
Logitech G403 Prodigy mouse
Huawei Mate 9
Google Daydream VR headset
3SIXT Ultra HD Sports Action Camera
Lexar® Portable SSD
Epson WorkForce DS-360W
Lexar® JumpDrive® S45 USB 3.0 flash drive
Surface Pro 4
Blade 28 backpack by Arc’teryx
Lexar® Professional 1800x microSDHC™/microSDXC™ UHS-II cards
Lexar® JumpDrive® C20c USB Type-C flash drive
Dell Inspiron 5000 series 2-in-1
HP Pavilion x360 13”
Garmin Fenix Chronos smartwatch
Audio-Technica ATH-ANC70 Noise Cancelling Headphones
Dell XPS 13 laptop
HD Pan/Tilt Wi-Fi Camera with Night Vision NC450
Most Popular Reviews
- 1 Huawei Mate 9 full in-depth smartphone review
- 2 ZTE Axon 7 review: Is ZTE dumping old stock on Australia?
- 3 Oppo R9s smartphone full review
- 4 Huawei Nova Plus smartphone review
- 5 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
Join the PC World newsletter!
Latest News Articles
- The new BlackBerry has a physical keyboard and will arrive in April
- Uber rejects claims it stole Waymo's self-driving car tech
- Microsoft Store has slashed the Asus ZenBook Flip's price by $200
- Google discloses unpatched IE vulnerability after Patch Tuesday delay
- FCC puts the brakes on ISP privacy rules it just passed in October
PCW Evaluation Team
I’d happily recommend this touchscreen laptop and Windows 10 as a great way to get serious work done at a desk or on the road.
Ultimately, I think the Windows 10 environment is excellent for me as it caters for so many different uses. The inclusion of the Xbox app is also great for when you need some downtime too!
For me, the Xbox Play Anywhere is a great new feature as it allows you to play your current Xbox games with higher resolutions and better graphics without forking out extra cash for another copy. Although available titles are still scarce, but I’m sure it will grow in time.
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
- How to quit Pokemon Go (or to start enjoying it again)
- Huawei Mate 9 full in-depth smartphone review
- Time to ditch Foxtel and the iQ3: How to replace Foxtel packages with cheaper alternatives
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- TPMicrosoft Dynamics DeveloperNSW
- FTApplications DeveloperACT
- CCBPM DeveloperVIC
- CCSQL Database AdministratorQLD
- TPiOS Developer (Mobile)NSW
- TPSolution Architect - IntegrationQLD
- FTNodeJS DeveloperNSW
- FTSenior Project Manager - PERMANENTACT
- CCProject Manager (Event Management)NSW
- CCBusiness Project ManagerNSW
- FTSenior Software Engineer x 2 - Adelaide Based (PV, NV2 or NV1 required)VIC
- CCMDM Consultant/DesignerVIC
- FTSenior Java EngineerACT
- TPBusiness Process Analyst (Newcaslte Based)NSW
- CCDesktop Engineer l WollongongNSW
- CCTest AnalystQLD
- FTSenior Database AdministratorVIC
- TPDigital Process Business Analyst - Digital Transformation**NSW
- FTMid-Level Software Engineer x 2 - Adelaide Based (PV, NV2 or NV1 required)ACT
- CCCA ITCM / ITCA EngineerNSW
- CCSenior Networks Specialist - DNS PlatformVIC
- TPProject Coordinator/Junior Project ManagerVIC
- TPDigital Project ManagerVIC
- TPService Desk ManagerVIC
- FTMid Level PHP DeveloperNSW