Users of Origin, the game distribution platform of Electronic Arts (EA), are vulnerable to remote code execution attacks through origin:// URLs, according to two security researchers.
The "NotCompatible" malware, designed to infect Android devices and turn them into unwitting Web proxies, is suddenly showing a sharp uptick in activity, according to mobile security vendor Lookout.
The vast majority of 3G and 4G USB modems handed out by mobile operators to their customers are manufactured by a handful of companies and run insecure software, according to two security researchers from Russia.
New research suggests a controversial spyware suite called FinFisher is being used to track activists in more countries than previously thought, including Vietnam and Ethiopia.
Since the start of the year, hackers have been exploiting vulnerabilities in Java to carry out a string of attacks against companies including Microsoft, Apple, Facebook and Twitter, as well as home users. Oracle has made an effort to respond faster ...
Reporters Without Borders named five countries that regularly spy on journalists and dissidents, a practice the group contends is made possible with advanced technology from private companies.
Recent reports from antivirus companies seem to suggest that the number of Android malware threats is growing. However, there are still many skeptics who think that the extent of the problem is exaggerated.
A botnet that has been in the eye of researchers for years continues to serve up malware, spam and fake antivirus software, according to research by Trend Micro.
Security researchers warn that cybercriminals have started using Java exploits signed with digital certificates to trick users into allowing the malicious code to run inside browsers.
Oracle released emergency patches for Java on Monday to address two critical vulnerabilities, one of which is actively being exploited by hackers in targeted attacks.
The attacks discovered last week that exploited a previously unknown Java vulnerability were likely launched by the same attackers that previously targeted security firm Bit9 and its customers, according to researchers from antivirus vendor Symantec.
Security researchers have identified an ongoing cyber-espionage campaign that compromised 59 computers belonging to government organizations, research institutes, think tanks and private companies from 23 countries in the past 10 days.
Bit9 said a common Web application vulnerability was responsible for allowing hackers to ironically use the security vendor's systems as a launch pad for attacks on other organizations.
Zendesk said Thursday a hacker gained access to support information for some customers of its online help desk software.
Websites affiliated with U.S. broadcaster NBC were hacked for several hours on Thursday, serving up malicious software intended to steal bank account details.
Gadgets & Things
Most Popular Reviews
- 1 Finally! LG OLED TV 2016 range review
- 2 Google Daydream View VR full, in-depth review
- 3 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
- 4 Apple iPhone 7 Plus review: including Portrait Mode
- 5 MSI GS70 laptop review
Join the PC World newsletter!
Latest News Articles
- Intel, Microsoft going long distance with Cortana on Windows 10 PCs
- Obama orders review of election hacks as Trump doubts Russia's role
- Ransomware attacks against businesses increased threefold in 2016
- Attackers use hacked home routers to hit Russia's 5 largest banks
- US mulls rules for airlines that plan in-flight Wi-Fi voice calls
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- The top 10 best and worst tech gadgets and products of 2016
- TV of the year award 2016
- Best phone of the year 2016
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- FTUI DeveloperVIC
- FTJava Security SpecialistNSW
- CCJava API Developer - MediaVIC
- CCService Desk AnalystNSW
- TPProcess Business AnalystVIC
- TPUAT LeadQLD
- CCProject CoordinatorNSW
- TPIT Project CoordinatorVIC
- FTIT Business PartnerNSW
- FTDatacentre Solution ArchitectVIC
- CCDevOps EngineerWA
- FTDesktop Support Team LeaderQLD
- TPNetwork EngineerVIC
- CCSenior Automation TesterVIC
- CCAEM DeveloperVIC
- CCTeam Lead / Senior Software Engineer - C/C++ / Web ServicesNSW
- CCInfrastructure Project ManagerNSW
- FTEnterprise Account ManagerNSW
- FTIT Service Design Analyst- ITSMNSW
- CCMS Dynamics CRM Functional ConsultantQLD
- CCAPI DeveloperOther
- FTAndroid Technical Lead (Work From Home 2-3 Days)NSW
- FTSenior UX DesignerVIC
- CCBusiness and Reporting AnalystWA
- FTBusiness Development AnalystVIC