An unpatched vulnerability in the Google Admin application for Android can allow rogue applications to steal credentials that could be used to access Google for Work acccounts.
Google has released another patch for the Stagefright vulnerability after a security firm said the first one didn't fix it.
Three “high risk” vulnerabilities in SAP Mobile could give attackers access to encrypted information stored in mobile devices, security firm Onapsis reported Wednesday.
The developing world is increasingly using mobile banking apps to move money, but new research shows those apps are often poorly coded and pose security risks.
Responding to an accusatory blog post, BlackBerry has again denied that its embedded operating system caused the potentially dangerous vulnerability recently demonstrated in Chrysler Jeep Cherokees.
Many smart phone manufacturers preload remote support tools on their Android devices in an insecure way, providing a method for hackers to take control of the devices through rogue apps or even SMS messages.
Google, Samsung and LG will start to issue monthly security patches for Android devices, taking a cue from the PC industry after critical vulnerabilities put hundreds of millions of smartphone users at risk.
A malicious application or Web page could be used to crash Android devices, in some cases persistently, due to a vulnerability in a multimedia processing component.
The vast majority of Android phones can be hacked by sending them a specially crafted multimedia message (MMS), a security researcher has found.
Data stolen from Hacking Team continues to yield information about the company's infiltration techniques. The latest find is a fake Android news app, which was used to install its flagship surveillance tool.
It's become common practice to use virtual private networks for extra privacy and security in this era of mass surveillance, but a study published this week suggests such networks may not be as safe as they're commonly made out to be.
Apple released patches for several exploits that could allow maliciously crafted applications to destroy apps that already exist on devices, access their data or hijack their traffic, but a large number of iOS devices are still vulnerable.
The developers of a mobile app called Prized that secretly mined cryptocurrencies on people's mobile phones have settled with the U.S. Federal Trade Commission after being accused of deceptive trade practices.
A critical vulnerability is affecting 600 million Samsung devices including the company’s new flagship device, the S6.
Security remains a big concern for businesses considering cloud storage, but Dropbox hopes to further calm their fears by integrating its service with enterprise mobile management products.
Most Popular Reviews
- 1 Samsung Galaxy Note 7 review
- 2 Portable power: Venom Blackbook 13 Zero review
- 3 Alcatel Idol 4S review: King of the mid-range?
- 4 Witness a 241% Australian price hike: Dell Latitude 7370 review
- 5 Is this the best value phone on the market? Moto G4 Plus review
Join the PC World newsletter!
Latest News Articles
- Attackers deploy rogue proxies on computers to hijack HTTPS traffic
- Intel's new Kaby Lake chips for PC: Here's the company's vision
- New ransomware threat deletes files from Linux web servers
- HPE is betting big on AI to fuel your apps and analytics
- Apple must repay $14.5 billion in underpaid taxes in Ireland
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCManager Architecture Practice Lead (Infrastructure Architect)NSW
- CCContract Analyst Programmer (Oracle SQL/.Net) 160812/AP/vhsAsia
- CCPersonal AssistantVIC
- CCNetwork Engineer - TelecomVIC
- FTApplications Support / Systems Administrator | DefenceACT
- FTIT Infrastructure EngineerSA
- CCiOS DeveloperVIC
- CCProject ManagerVIC
- CCSr. Project Manager- Infrastructure- Data Centre,VirtualizationNSW
- CCTechnical Business Analyst- BABOK,Infrastructure, Banking bkgndNSW
- CCContract Analyst Programmer (Crystal Report/JAVA) 160816/AP/vhsAsia
- CCIT Program Manager - TelecommunicationsNSW
- FTNational ICT Senior Technical Support EngineerACT
- CCTest Environment ManagerNSW
- CCDesktop Support AnalystNSW
- FTBusiness Development ManagerVIC
- CCImplementation and Deployment ManagerNSW
- CCSoftware Engineer - Linux with NV1 clearanceVIC
- CCSr IT Support specialist - MCSE- L2/L3- Travelling requiredNSW
- CCSolutions Architect - Office 365/Sharepoint/Project OnlineQLD
- CCDesktop Support (Contract Renewable)Asia
- CCContract IT Assistant (SQL/Windows7/8/10) 160901/AP/781Asia
- CCCA Gen Model Management-Oracle RDBMS, Oracle Solaris, TTNNSW
- CCDevOps Engineer - Php, LAMP, XML, scripting, JavaNSW
- CCBig Data SpecialistNSW