It's become common practice to use virtual private networks for extra privacy and security in this era of mass surveillance, but a study published this week suggests such networks may not be as safe as they're commonly made out to be.
Apple released patches for several exploits that could allow maliciously crafted applications to destroy apps that already exist on devices, access their data or hijack their traffic, but a large number of iOS devices are still vulnerable.
The developers of a mobile app called Prized that secretly mined cryptocurrencies on people's mobile phones have settled with the U.S. Federal Trade Commission after being accused of deceptive trade practices.
A critical vulnerability is affecting 600 million Samsung devices including the company’s new flagship device, the S6.
Security remains a big concern for businesses considering cloud storage, but Dropbox hopes to further calm their fears by integrating its service with enterprise mobile management products.
Despite the convenience, free public Wi-Fi networks like those found in hotels, Starbucks, and McDonald's are also a serious risk when it comes to your data and personal information.
Business travelers willing to give Windows 8 a spin have a noteworthy option in the HP Folio Elitebook Folio 9470m.
In June 2007, Apple released the iPhone, and the device quickly took off to become a major brand in the smartphone market. Yet when the iPhone shipped, security on the mobile operating system was nearly nonexistent. Missing from the initial iOS (then...
You may already know the basics of Internet security and keeping your personal data private while browsing the Web: Use a firewall, don't open attachments you aren't expecting, and never follow links from strangers. But what about your smartphone? Th...
Whitepapers about mobile security
In the second half of 2013, the advancement of security breaches across all industries continued to rise. Within this report, we’ll explain how more than half a billion records of personally identifiable information (PII) such as names, emails, credit card numbers and passwords were leaked in 2013 - and how these security incidents show no signs of stopping.
Most Popular Reviews
- 1 Sony Xperia Z4 Tablet (LTE) review: The tablet of choice for anyone on Android
- 2 Bose SoundLink Mini II Bluetooth speaker review
- 3 Apple MacBook Air 2015 review: Only better with time
- 4 HTC One (M8s) review: Better value for money than HTC's flagship
- 5 ZTE Blade S6 review: A dual-SIM, 4G smartphone for less than $300
Join the PC World newsletter!
Deals on PC World
- Networking, Wireless & VoIP
Deals on PC World
Latest News Articles
- Uber throws in the towel in battle with French taxi drivers
- Android phone vendors should improve update policies, consumer organization says
- Five smartphones to look forward to
- Ad fraud Trojan updates Flash Player so that other malware can't get in
- The Upload: Your tech news briefing for Friday, July 3
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.