A new malware program attempts to extort money from gamers by encrypting game saves and other user-generated files for popular computer games.
As security researchers continue to analyze malware used by a sophisticated espionage group dubbed the Equation, more clues surface that point to the U.S. National Security Agency being behind it.
If you patched your Windows computers in 2010 against the LNK exploit used by Stuxnet and thought you were safe, researchers from Hewlett-Packard have some bad news for you: Microsoft's fix was flawed.
Researchers sponsored by the U.S. government have reportedly tried to defeat the encryption and security of Apple devices for years.
Dell is getting deeper into the business of securing corporate networks, releasing a new integrated security suite based on encryption technology it acquired when it purchased Credent in 2012.
A collection of computer Trojans that have been used since 2009 to steal data from government agencies, military contractors, media organizations and other companies is tied to cyberespionage malware possibly created by French intelligence agencies.
Some people who use uTorrent, the popular BitTorrent client, are up in arms over the presence of cryptocurrency mining software on their computers which they say was installed without their permission.
The Cryptolocker ransomeware virus has reared its ugly head once again on Australian shores.
A security system undergoing testing by a San-Francisco-based company aims to speed up the detection of websites and domains used for cybercrime.
Hundreds of hacked domain name accounts registered through GoDaddy are being used as part of a highly effective campaign using the Angler exploit kit to infect computers with malware.
New malware spreading across Android devices via text messages promises free Amazon gift cards but delivers only spam to everyone on the device's contact list.
Lenovo's website appeared to have been hacked on Wednesday, possibly in retaliation for a piece of adware it installed on PCs that was found to have opened up a security hole.
European law enforcement agencies seized command-and-control servers used by Ramnit, a malware program that steals online banking credentials, FTP passwords, session cookies and personal files from victims.
Attackers who penetrate company networks often pose as legitimate users for long periods of time, causing lengthy delays before victims figure out they've been hacked.
Next time you turn off your Android phone, you might want take the battery out just to be certain.
Most Popular Reviews
- 1 Kogan Agora 4G Pro review: the final word on Kogan's best smartphone
- 2 Sony Xperia Z4 Tablet (LTE) review: The tablet of choice for anyone on Android
- 3 Bose SoundLink Mini II Bluetooth speaker review
- 4 Apple MacBook Air 2015 review: Only better with time
- 5 Lenovo ThinkPad T550 laptop
Join the PC World newsletter!
Deals on PC World
- Networking, Wireless & VoIP
Deals on PC World
Latest News Articles
- Who goes there? CA will know with Xceedium buy
- India reverses ban on porn websites
- EFF-led group wants to give do-not-track some bite
- Senate heads toward vote on CISA cyberthreat info sharing bill
- The Upload: Your tech news briefing for Tuesday, August 4
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCLead Generator - Software SolutionsNSW
- FTField EngineerNSW
- FTSenior Network EngineerNSW
- CCAccount Strategist | Sales Executive | Global Search EngineNSW
- CCMarketing Coordinator - World's largest search engine!NSW
- FTDesktop Engineering ManagerNSW
- FTDevOps Consultant - Microsoft Experience - Digital ConsultancyVIC
- FTBusiness Development Manager & Account ManagerVIC