An unpatched vulnerability in the Google Admin application for Android can allow rogue applications to steal credentials that could be used to access Google for Work acccounts.
Google has released another patch for the Stagefright vulnerability after a security firm said the first one didn't fix it.
Three “high risk” vulnerabilities in SAP Mobile could give attackers access to encrypted information stored in mobile devices, security firm Onapsis reported Wednesday.
The developing world is increasingly using mobile banking apps to move money, but new research shows those apps are often poorly coded and pose security risks.
Responding to an accusatory blog post, BlackBerry has again denied that its embedded operating system caused the potentially dangerous vulnerability recently demonstrated in Chrysler Jeep Cherokees.
Many smart phone manufacturers preload remote support tools on their Android devices in an insecure way, providing a method for hackers to take control of the devices through rogue apps or even SMS messages.
Google, Samsung and LG will start to issue monthly security patches for Android devices, taking a cue from the PC industry after critical vulnerabilities put hundreds of millions of smartphone users at risk.
A malicious application or Web page could be used to crash Android devices, in some cases persistently, due to a vulnerability in a multimedia processing component.
The vast majority of Android phones can be hacked by sending them a specially crafted multimedia message (MMS), a security researcher has found.
Data stolen from Hacking Team continues to yield information about the company's infiltration techniques. The latest find is a fake Android news app, which was used to install its flagship surveillance tool.
It's become common practice to use virtual private networks for extra privacy and security in this era of mass surveillance, but a study published this week suggests such networks may not be as safe as they're commonly made out to be.
Apple released patches for several exploits that could allow maliciously crafted applications to destroy apps that already exist on devices, access their data or hijack their traffic, but a large number of iOS devices are still vulnerable.
The developers of a mobile app called Prized that secretly mined cryptocurrencies on people's mobile phones have settled with the U.S. Federal Trade Commission after being accused of deceptive trade practices.
A critical vulnerability is affecting 600 million Samsung devices including the company’s new flagship device, the S6.
Security remains a big concern for businesses considering cloud storage, but Dropbox hopes to further calm their fears by integrating its service with enterprise mobile management products.
Most Popular Reviews
- 1 Huawei P9 review: lifting photography to another level... sometimes.
- 2 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 3 D-Link Taipan AC3200 Ultra tri-band modem-router review
- 4 Dell XPS 13 (2016) review: Making the very best Ultrabook
- 5 Microsoft Surface Book review: The verdict on Microsoft's first notebook
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- Review: Wireless charging and waterproof cases for iPhone plus Ollclip (Movie) Studio case
- Google tool lets users personalize the ads they see
- Review: Incipio OtterBox and 3Sixt covers for the Samsung Galaxy S7 and S7 Edge
- All coverage from Computex 2016
- Huawei beats Samsung and all Android rivals on security patching
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCProject Manager - IT SecurityNSW
- CCBusiness Analyst, InsuranceNSW
- CCDigital Business AnalystVIC
- CCLead Solution Analyst - BMC Remedy softwareVIC
- CCRelease & Configuration Manager | Defence intelligence application | NV1 clearedACT
- FTEnterprise Technology Platform ManagerVIC
- FTIT Project ManagerAsia
- FTUX DesignerVIC
- CCWeb Developer (Drupal)SA
- CCSolution DesignerNSW
- CCSalesforce Technical Business AnalystNSW
- CCIntegration ArchitectACT
- CCSAP Financial Master DataACT
- CCAnalyst Programmer (System Backup Operation/UNIX) 160615/AP/791Asia
- CCSystems Monitoring Specialist - Foglight focusNSW
- CCTenable Security - Technical ConsultantVIC
- FTSolution ArchitectNSW
- CCHybrid Mobile App DeveloperNSW
- CCAEM Backend DeveloperVIC
- CCUX DesignersQLD
- FTEnvironment ManagerVIC
- CCSalesforce DeveloperVIC
- CCIT Business AnalystNSW
- CCAnalyst Programmer (J2EE/ SQL*PLUS/PL/SQL/PRO*C) 160617/AP/983Asia
- CCIT Finance Systems Process AnalystNSW