Security researchers from Damballa have found a new variant of the Pushdo malware that's better at hiding its malicious network traffic and is more resilient to coordinated takedown efforts.
Security researchers from Russian cybercrime investigations firm Group-IB have uncovered a cyberfraud operation that uses specialized financial malware to target the customers of several major Australian banks.
The Android threat landscape is growing in both size and complexity with cybercriminals adopting new distribution methods and building Android-focused malware services, according to a report from Finnish security vendor F-Secure.
Hackers are finding it pays to call ahead before sending malware-laden email.
AutoIt, a scripting language for automating Windows interface interactions, is increasingly being used by malware developers thanks to its flexibility and low learning curve, according to security researchers from Trend Micro and Bitdefender.
An Algerian man accused of helping to develop and distribute the SpyEye computer virus has been extradited from Thailand to the U.S. to face criminal charges, the U.S. Department of Justice announced.
A recently patched Java remote code execution vulnerability is already being exploited by cybercriminals in mass attacks to infect computers with scareware, security researchers warn.
A well-known cyber-spying tool called Gh0st RAT is still being employed in stealthy malware attacks, according to a new report from security firm FireEye.
Twitter users in the Netherlands are being targeted by a piece of malware that hijacks their accounts, according to security vendor Trusteer.
Even though the majority of data breaches continue to be the result of financially motivated cybercriminal attacks, cyberespionage activities are also responsible for a significant number of data theft incidents, according to a report that will be re...
Researchers from security firm Trusteer have found a new variant of the Gozi banking Trojan program that infects a computer's Master Boot Record (MBR) in order to achieve persistence.
A Russian porn site is delivering malware that uses the victims' computers to mine bitcoins, according to research from ThreatTrack Security.
Security researchers from Russian cybercrime investigations company Groub-IB have recently identified a new piece of malware designed to steal login credentials from specialized software used to trade stocks and other securities online.
Cybercriminals are increasingly targeting small businesses due to their less sophisticated defenses, according to a new report from Symantec.
A review of poker applications shows that many suffer security flaws, putting players at risk of attack, according to a Malta-based security company.
Gadgets & Things
Most Popular Reviews
- 1 Finally! LG OLED TV 2016 range review
- 2 Google Daydream View VR full, in-depth review
- 3 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
- 4 Apple iPhone 7 Plus review: including Portrait Mode
- 5 MSI GS70 laptop review
Join the PC World newsletter!
Latest News Articles
- Microsoft's new Zo chatbot dodges politics, doesn't always make sense
- Privacy groups urge investigation of 'internet of toys'
- Facebook, Twitter, Microsoft and YouTube will share terror content info
- AT&T means business with a 5G trial at Intel
- How to password protect a PDF before sending it by email
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- TV of the year award 2016
- Best phone of the year 2016
- Google Daydream View VR full, in-depth review
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- FTJava Security SpecialistNSW
- FTTechnical Business AnalystNSW
- CCHadoop DeveloperVIC
- FTInfrastructure AnalystQLD
- CCJava DeveloperNSW
- FTProduct OwnerVIC
- FTLevel 2/3 Application Support SpecialistQLD
- CCSecurity SpecialistNSW
- CCIteration Manager / Scrum MasterNSW
- FTChange AnalystVIC
- FTFront End DeveloperVIC
- CCPerformance Test AnalystOther
- FTSecurity AdministratorVIC
- CCProduct Designer - UIACT
- FTSenior Business Analyst -permanent opportunityVIC
- TPProject CoordinatorNSW
- FTSolution Architect with end user (EUC) computing experienceNSW
- CCSenior Business Analyst - Telco - Melbourne CBDVIC
- FTAngular DeveloperSA
- FTChange or Project Manager- Electrical Network EngineeringNSW
- CCUX DesignerNSW
- TPProject ManagerVIC
- CCLinux Systems Infra and Network EngineerSA
- FTLicensing SpecialistVIC
- FTProject Manager-accommodation strategy and ABW implementationVIC