Facebook's fake account detection mechanisms can be defeated 80 percent of the time with the help of automated tools, researchers from the University of British Columbia (UBC) have found after an eight-week test.
A newly identified Mac OS X Trojan bundles a component that leverages the processing power of video cards (GPUs) to generate Bitcoins, a popular type of virtual currency.
A new variant of the DroidKungFu Android Trojan is posing as a legitimate application update in order to infect handsets, according to security researchers from Finnish antivirus vendor F-Secure.
Experts from security vendor ESET warn that TDL4, one of the most sophisticated pieces of malware in the world, <a href="http://blog.eset.com/2011/10/18/tdl4-rebooted">is being rewritten and improved</a> for increased resilience to antivirus detectio...
Searching for Flash Player on Bing and Yahoo can lead to rogue pages distributing a hard-to-remove rootkit, according to security researchers from antivirus vendor GFI Software.
Zero-day exploits are nerve-racking for IT professionals but are far less dangerous than unpatched older vulnerabilities for which fixes are available, Microsoft says.
Mobile phones will become an increasing menace to network security that could drop malware onto protected devices when they dock to sync or plug into USB ports to charge, security experts say in a Georgia Tech report.
Officials in a number of German state governments have owned up to using the Quellen-TKÜ Trojan Horse software in criminal investigations to intercept encrypted telecommunications on PCs. At least one state said it has suspended use of the software, ...
Members of a hacking think-tank called Blackhat Academy claim that Facebook's URL scanning systems can be tricked into thinking malicious pages are clean by using simple content cloaking techniques.
At a time when the cyberthreat level is at its peak, many federal agencies continue to struggle with IT security.
Websites that accidentally distribute rogue code could find it harder to undo the damage if attackers exploit widespread browser support for HTML5 local storage and an increasing tendency for heavy users of Web apps never to close their browser.
Microsoft has opened a front in its ongoing battle against Internet scammers, using the power of a U.S. court to deal a knockout blow to an emerging botnet and taking offline a provider of free Internet domains.
Android smartphone users can take some commonsense precautions to protect their personal data from being stolen -- important advice considering an app developer purports to know how to take the information in under 60 seconds.
The latest espionage-related hacking campaign detailed by security vendor Trend Micro is most notable for the country it does not implicate: China.
MikeWik's PC got infected with rogue malware. He asked the Antivirus & Security Software forum for help.
Most Popular Reviews
- 1 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 2 D-Link Taipan AC3200 Ultra tri-band modem-router review
- 3 BlackBerry Priv review: When old habits die hard
- 4 Dell XPS 13 (2016) review: Making the very best Ultrabook
- 5 Microsoft Surface Book review: The verdict on Microsoft's first notebook
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- Google execs defend tax deal to UK legislators
- Now your phone can scan documents directly to the cloud with Box Capture
- Critical VPN key exchange flaw exposes Cisco security appliances to remote hacking
- Qualcomm bringing LTE connectivity to wearables with new Wear platform
- Qualcomm's new chips target low-cost smartphones with premium features
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTDigital Marketing Specialist | Media BuyerNSW
- CCProject AdvisorNSW
- CCAndroid and iOS DevelopersVIC
- CCSolution Architect - .NET environmentACT
- CCRisk AnalystVIC
- FTUX Front-End DeveloperWA
- CCSenior Test AnalystSA
- CCSenior Business Systems AnalystACT
- FTAndroid DeveloperNSW
- FTSystems Administrator/Engineer | Projects & BAU | Coastal Newcastle NSWWA
- CCSharepoint AdministratorVIC
- CCInformation Security ManagerNSW
- CCSenior Business Analyst - Life InsuranceVIC
- CCBusiness Analyst - CanberraNSW
- CCProgram Manager - Big Data - Telecommunications - UrgentNSW
- FTNetwork Engineer | Canberra | NV1 NV2 clearance | Defence projectsVIC
- CCSolution Architect - .NET TechnologiesNSW
- CCSenior Information Security SpecialistNSW
- CCContract Analyst Programmer (MS.Net/Visual Basic) 160129/AP/vtdAsia
- FTManual Software TesterNSW
- CCHelpdesk SupportNSW
- CCDBA (Oracle/SQL)NSW
- CCSenior Business Analyst, Online Gaming SystemsNSW
- FTInfrastructure Project Manager - NV1 clearance mandatoryNSW
- CCSAP Basis Admin with JavaACT