Next time you turn off your Android phone, you might want take the battery out just to be certain.
VirusTotal, a Google-owned online malware scanning service, is creating a whitelist of products from large software vendors to reduce bad detections by antivirus programs.
Security-conscious IT leaders already have a rocky romance with the BYOD trend, and as Valentine's day approaches it's emerged that lonely-heart employees could be putting company data up for grabs by using dating apps.
A team of hackers that target governments, the military and journalists has turned its attention to the iPhone, according to Trend Micro.
Google has done a good job at keeping data-stealing Trojan apps out of Google Play, but attackers still find ways to monetize rogue apps through the store.
When restrictive IT policies push employees to personal smartphone apps to share corporate data, the security of that information is at risk. On Wednesday, MobileIron will release an update to its Content Security Service that seeks to plug that hole...
Samsung Electronics and Good Technology hope to convince more enterprises to use Android-based smartphones and tablets, with the help of a joint offering designed to protect the OS, applications and data.
The SilentText secure messaging application bundled with Blackphone had a serious vulnerability that would have allowed attackers to decrypt messages, read contact information, gather location data and even execute malicious code on the phone.
Samsung Electronics smartphones and tablets protected using the company's Knox security technology have been integrated with VPNs from Cisco Systems, giving enterprises more options for communicating securely.
A vulnerability in the IBM Endpoint Manager for mobile devices could allow attackers to execute malicious code on the servers used by companies to manage devices.
An Android Trojan program that's behind one of the longest running multipurpose mobile botnets has been updated to become stealthier and more resilient.
Android users in Melbourne’s CBD are the most at risk sector of the community for malware threats according to a report released by F-secure.
Security researchers have discovered a vulnerability in iPhones and iPads that allows attackers to install fake apps that take the place of legitimate ones.
Attackers have used rogue applications for both OS X and Windows to infect iPhones and iPads in China with a malware program that steals contact information and other private data.
There's a scary new piece of malware that collects call logs, phone-book contacts and other sensitive information from Apple iPhones and iPads. Should you be worried?
Gadgets & Things
Most Popular Reviews
- 1 Finally! LG OLED TV 2016 range review
- 2 Google Daydream View VR full, in-depth review
- 3 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
- 4 Apple iPhone 7 Plus review: including Portrait Mode
- 5 MSI GS70 laptop review
Join the PC World newsletter!
Latest News Articles
- Microsoft's "Holoportation" will virtually beam you into another room
- Russia claims it foiled a cyber attack from a foreign spy service
- Intel's silence on Optane SSDs raises questions about launch and focus
- Random iPhone 6s shutdowns due to faulty battery component, Apple says
- Researchers find a way bypass the iOS activation lock
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- TV of the year award 2016
- Best phone of the year 2016
- Google Daydream View VR full, in-depth review
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- TPSenior Project AnalystNSW
- CCProgress DeveloperQLD
- CCSolution Designer and DeveloperNSW
- CCHadoop Developer - Big DataNSW
- CCSenior Integration DeveloperQLD
- CCSAP HR & Payroll Project ManagerACT
- FTBusiness Systems Analyst | Travel IndustryQLD
- FTCampaign AnalystVIC
- TPFront End DeveloperNSW
- CCProduct Manager - Life Insurance (Fixed-Term)VIC
- CCSenior Platform Developer/ArchitectNSW
- CCAgile Iteration ManagerNSW
- CCPerformance Test AnalystNSW
- CCProject Manager / Business Analyst - TelecommunicationsNSW
- CCNetwork Engineer - Sydney - Leading OrganisationNSW
- FTHadoop DeveloperSA
- CCIT Specialist - Application Blueprinting Engineer ( Developer)ACT
- FTUX DesignerVIC
- FTSystem AdministratorNSW
- CCSenior Project AnalystNSW
- FTPortal Project ManagerNSW
- CCAutoCAD Business System Analyst/ GIS, Spatial AnalystNSW
- CCUAT TesterQLD
- FTSenior Financial Planner - GeelongVIC
- CCBusiness Analyst-Shared Service Contact Centre or Call CentreNSW