Security researchers from Kaspersky Lab have identified a spam message campaign on Skype that spreads a piece of malware with Bitcoin mining capabilities.
Organizations face malware-related events that bypass traditional defense technologies on their networks every three minutes, according to a new report released Wednesday by security vendor FireEye.
Researchers from security vendor FireEye have uncovered a new APT (advanced persistent threat) that uses multiple detection evasion techniques, including the monitoring of mouse clicks, to determine active human interaction with the infected computer...
An analysis of a piece of Android spyware targeting a prominent Tibetan political figure suggests it may have been built to figure out the victim's exact location.
The authors of police-themed ransomware have started using the browsing histories from infected computers in order to make their scams more believable, according to an independent malware researcher.
A global credit card fraud network was shut down on Thursday as the result of an international police operation called "Pandora-Storm" that saw the participation of 20 law enforcement agencies from Europe, America and Australia, Europol announced,
A new piece of malware that infects point-of-sale (POS) systems has already been used to compromise thousands of payment cards belonging to customers of U.S. banks, according to researchers from Group-IB, a security and computer forensics company bas...
A piece of malicious software spotted by Trend Micro uses the note-taking service Evernote as a place to pick up new instructions.
Most browser installations use outdated versions of the Java plug-in that are vulnerable to at least one of several exploits currently used in popular Web attack toolkits, according to statistics published Monday by security vendor Websense.
Security researchers from antivirus vendor Kaspersky Lab have identified a targeted email attack against human rights and political activists that distributed a custom Android Trojan app with information-stealing capabilities.
A new version of the TDL rootkit-type malware program downloads and abuses an open-source library called the Chromium Embedded Framework that allows developers to embed the Chromium Web rendering engine inside their own applications, according to sec...
A new piece of custom malware sold on the underground Internet market is being used to siphon payment card data from point-of-sale (POS) systems, according to security researchers from antivirus vendor McAfee.
Security researchers have uncovered yet another ongoing cyberespionage operation targeting political and human rights activists, government agencies, research organizations and industrial manufacturers primarily from Eastern European countries and fo...
Security vendors analyzing the code used in the cyberattacks against South Korea are finding nasty components designed to wreck infected computers.
An anonymous researcher created a massive botnet by hijacking about 420,000 Internet-accessible embedded devices with default or no login passwords and used it to map the entire Internet.
Gadgets & Things
Most Popular Reviews
- 1 Finally! LG OLED TV 2016 range review
- 2 Google Daydream View VR full, in-depth review
- 3 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
- 4 Apple iPhone 7 Plus review: including Portrait Mode
- 5 MSI GS70 laptop review
Join the PC World newsletter!
Latest News Articles
- Microsoft's "Holoportation" will virtually beam you into another room
- Russia claims it foiled a cyber attack from a foreign spy service
- Intel's silence on Optane SSDs raises questions about launch and focus
- Random iPhone 6s shutdowns due to faulty battery component, Apple says
- Researchers find a way bypass the iOS activation lock
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- TV of the year award 2016
- Best phone of the year 2016
- Google Daydream View VR full, in-depth review
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- FTSecurity ConsultantQLD
- FTPrincipal Product Manager | Cloud | Managed ServicesNSW
- FTBusiness AnalystSA
- CCJava API DeveloperTAS
- FTTechnical Solutions Architect - CloudNSW
- FTSoftware Implementation ConsultantVIC
- CCJunior Data Centre Support Technician - Sydney CBDNSW
- CCAgile Iteration ManagerNSW
- FTSenior C++ EngineerACT
- TPProject ManagerQLD
- FTJapanese Speaking Technical Support EngineerNSW
- FTProject ManagerNSW
- CCWeb Application SpecialistVIC
- CCMainframe Project ManagerVIC
- CCLearning & Development SpecialistNSW
- CCInfrastructure Architect - Immediate Start - Migration Project -Hyper-V & VMWareNSW
- FTProject CoordinatorVIC
- FTSitecore .Net DeveloperVIC
- CCWeb Services Tester- Test AnalystNSW
- CCIteration Manager / Scrum MasterSA
- FTSenior Consultant/ArchitectNSW
- CCPerformance Test AnalystVIC
- CCSolution Architect-PHPNSW
- FTEnterprise Architect - BusinessQLD
- FTProject ManagerNSW