A recently patched Java remote code execution vulnerability is already being exploited by cybercriminals in mass attacks to infect computers with scareware, security researchers warn.
A well-known cyber-spying tool called Gh0st RAT is still being employed in stealthy malware attacks, according to a new report from security firm FireEye.
Twitter users in the Netherlands are being targeted by a piece of malware that hijacks their accounts, according to security vendor Trusteer.
Even though the majority of data breaches continue to be the result of financially motivated cybercriminal attacks, cyberespionage activities are also responsible for a significant number of data theft incidents, according to a report that will be re...
Researchers from security firm Trusteer have found a new variant of the Gozi banking Trojan program that infects a computer's Master Boot Record (MBR) in order to achieve persistence.
A Russian porn site is delivering malware that uses the victims' computers to mine bitcoins, according to research from ThreatTrack Security.
Security researchers from Russian cybercrime investigations company Groub-IB have recently identified a new piece of malware designed to steal login credentials from specialized software used to trade stocks and other securities online.
Cybercriminals are increasingly targeting small businesses due to their less sophisticated defenses, according to a new report from Symantec.
A review of poker applications shows that many suffer security flaws, putting players at risk of attack, according to a Malta-based security company.
Security researchers from Kaspersky Lab have identified a spam message campaign on Skype that spreads a piece of malware with Bitcoin mining capabilities.
Organizations face malware-related events that bypass traditional defense technologies on their networks every three minutes, according to a new report released Wednesday by security vendor FireEye.
Researchers from security vendor FireEye have uncovered a new APT (advanced persistent threat) that uses multiple detection evasion techniques, including the monitoring of mouse clicks, to determine active human interaction with the infected computer...
An analysis of a piece of Android spyware targeting a prominent Tibetan political figure suggests it may have been built to figure out the victim's exact location.
The authors of police-themed ransomware have started using the browsing histories from infected computers in order to make their scams more believable, according to an independent malware researcher.
A global credit card fraud network was shut down on Thursday as the result of an international police operation called "Pandora-Storm" that saw the participation of 20 law enforcement agencies from Europe, America and Australia, Europol announced,
Most Popular Reviews
- 1 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 2 D-Link Taipan AC3200 Ultra tri-band modem-router review
- 3 Dell XPS 13 (2016) review: Making the very best Ultrabook
- 4 Microsoft Surface Book review: The verdict on Microsoft's first notebook
- 5 Telstra Wi-Fi 4GX Advanced III review: Testing the world's first 600Mbps wireless hotspot
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- If Tim Burton made a robot, this would be it
- Here's how NASCAR is digitizing race day
- Should Microsoft release a successor to Surface 3?
- Researchers steal data from a PC by controllng the noise from the fans
- The 'summer of AI' is here, this startup chief says
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTEnvironment ManagerVIC
- CCTelecommunications Operations Support officerACT
- CCChange ManagerNSW
- CCSAP Business Analyst - FinanceNSW
- CCOrganisational Change ManagerVIC
- CCProject Manager | Experimental military technology | NV1ACT
- CCBusiness Analyst- Process Mapping Specialist- Gov / Bank backgdNSW
- FTSystems Analyst - ERPNSW
- FTMobility Developer x 2 - iOS and Android positions available!NSW
- CCContract Analyst Programmer (JAVA/SQL) 160617/AP/623Asia
- FTSAP Solution Architect- Data Migration to SAP HR, payrollNSW
- CCSolution ArchitectNSW
- CCSystems Engineer | Defence intelligence projects | NV2 clearanceACT
- CCInfrastructure ArchitectACT
- CCSystems Monitoring Specialist - Foglight focusNSW
- CCSenior IT Automated TesterNSW
- FTTechnical Business Analyst (Integration background)NSW
- CCBusiness System Analyst - FinanceVIC
- FTProject Manager - Insurance experience neededNSW
- CCSAP PI/PO ConsultantVIC
- CCSenior Performance & Automation EngineerNSW
- CCSenior Applications SpecialistQLD
- CCLead Communications ConsultantWA
- CCProgram Test ManagerNSW
- FTSenior Java Developer (Java/Maven/AEM)NSW