An unpatched vulnerability in the Google Admin application for Android can allow rogue applications to steal credentials that could be used to access Google for Work acccounts.
Google has released another patch for the Stagefright vulnerability after a security firm said the first one didn't fix it.
Three “high risk” vulnerabilities in SAP Mobile could give attackers access to encrypted information stored in mobile devices, security firm Onapsis reported Wednesday.
The developing world is increasingly using mobile banking apps to move money, but new research shows those apps are often poorly coded and pose security risks.
Responding to an accusatory blog post, BlackBerry has again denied that its embedded operating system caused the potentially dangerous vulnerability recently demonstrated in Chrysler Jeep Cherokees.
Many smart phone manufacturers preload remote support tools on their Android devices in an insecure way, providing a method for hackers to take control of the devices through rogue apps or even SMS messages.
Google, Samsung and LG will start to issue monthly security patches for Android devices, taking a cue from the PC industry after critical vulnerabilities put hundreds of millions of smartphone users at risk.
A malicious application or Web page could be used to crash Android devices, in some cases persistently, due to a vulnerability in a multimedia processing component.
The vast majority of Android phones can be hacked by sending them a specially crafted multimedia message (MMS), a security researcher has found.
Data stolen from Hacking Team continues to yield information about the company's infiltration techniques. The latest find is a fake Android news app, which was used to install its flagship surveillance tool.
It's become common practice to use virtual private networks for extra privacy and security in this era of mass surveillance, but a study published this week suggests such networks may not be as safe as they're commonly made out to be.
Apple released patches for several exploits that could allow maliciously crafted applications to destroy apps that already exist on devices, access their data or hijack their traffic, but a large number of iOS devices are still vulnerable.
The developers of a mobile app called Prized that secretly mined cryptocurrencies on people's mobile phones have settled with the U.S. Federal Trade Commission after being accused of deceptive trade practices.
A critical vulnerability is affecting 600 million Samsung devices including the company’s new flagship device, the S6.
Security remains a big concern for businesses considering cloud storage, but Dropbox hopes to further calm their fears by integrating its service with enterprise mobile management products.
Most Popular Reviews
- 1 Hisense Series 7 ULED 4K UHD TV review
- 2 Samsung Galaxy Note 7 review
- 3 Portable power: Venom Blackbook 13 Zero review
- 4 Alcatel Idol 4S review: King of the mid-range?
- 5 Samsung Galaxy S7 Edge Review
Join the PC World newsletter!
Latest News Articles
- FBI reports more attempts to hack voter registration system
- Home Theatre review: Which is better, a 4K projector or 4K TV?
- Logitech HD Pro Webcam C920 review: HD video and stereo sound add polish to video calls
- Boat rental with GetMyBoat – the AirBnB of boating
- A new Microsoft tool shows how Win 10 might affect devices
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCNetwork and Security EngineerNSW
- CCIT Security ArchitectACT
- CCSenior Project ManagerACT
- FTInfrastructure Solutions ArchitectACT
- CCBusiness ArchitectNSW
- CCiOS DeveloperNSW
- CCSolution ArchitectQLD
- CCSoftware TesterACT
- FTNetApp Storage ConsultantWA
- CCJava / J2ee ProgrammersACT
- FTNetwork and Security Design EngineerNSW
- FTJava DeveloperNSW
- CCLAN ConsultantWA
- CCBI Reporting AnalystACT
- CCDesktop Infrastructure SpecialistACT
- CCContract Web Developer (160915/WD/vmp)Asia
- FTSenior PHP DeveloperNSW
- CCSolutions ArchitectACT
- FTMDM EngineerNSW
- CCProgram Manager - Data InsightVIC
- FTCarrier/ Industrial Network ConsultantsWA
- CCTest Manager (HP Quality Centre / Kronos)NSW
- FTOutbound TelesalesVIC
- CCWAN Architect and ConsultantWA
- FTBackup ConsultantWA