Next time you turn off your Android phone, you might want take the battery out just to be certain.
VirusTotal, a Google-owned online malware scanning service, is creating a whitelist of products from large software vendors to reduce bad detections by antivirus programs.
Security-conscious IT leaders already have a rocky romance with the BYOD trend, and as Valentine's day approaches it's emerged that lonely-heart employees could be putting company data up for grabs by using dating apps.
A team of hackers that target governments, the military and journalists has turned its attention to the iPhone, according to Trend Micro.
Google has done a good job at keeping data-stealing Trojan apps out of Google Play, but attackers still find ways to monetize rogue apps through the store.
When restrictive IT policies push employees to personal smartphone apps to share corporate data, the security of that information is at risk. On Wednesday, MobileIron will release an update to its Content Security Service that seeks to plug that hole...
Samsung Electronics and Good Technology hope to convince more enterprises to use Android-based smartphones and tablets, with the help of a joint offering designed to protect the OS, applications and data.
The SilentText secure messaging application bundled with Blackphone had a serious vulnerability that would have allowed attackers to decrypt messages, read contact information, gather location data and even execute malicious code on the phone.
Samsung Electronics smartphones and tablets protected using the company's Knox security technology have been integrated with VPNs from Cisco Systems, giving enterprises more options for communicating securely.
A vulnerability in the IBM Endpoint Manager for mobile devices could allow attackers to execute malicious code on the servers used by companies to manage devices.
An Android Trojan program that's behind one of the longest running multipurpose mobile botnets has been updated to become stealthier and more resilient.
Android users in Melbourne’s CBD are the most at risk sector of the community for malware threats according to a report released by F-secure.
Security researchers have discovered a vulnerability in iPhones and iPads that allows attackers to install fake apps that take the place of legitimate ones.
Attackers have used rogue applications for both OS X and Windows to infect iPhones and iPads in China with a malware program that steals contact information and other private data.
There's a scary new piece of malware that collects call logs, phone-book contacts and other sensitive information from Apple iPhones and iPads. Should you be worried?
Most Popular Reviews
- 1 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
- 2 Sony Xperia XZ review: turbo-charged last-gen phone
- 3 Hisense Series 7 ULED 4K UHD TV review
- 4 Sony X9300D and X8500D UHD 4K TV review
- 5 Moto X Force review: Leading features from a mid-range phone
Join the PC World newsletter!
Latest News Articles
- To solve IoT security, look at the big picture, ARM says
- FCC tells ISPs to get customer permission before sharing sensitive info
- No need to shoot down drones! Many of them can now be hijacked
- Qualcomm agrees to buy NXP for over $37 billion
- Privacy group shoots legal arrow at Privacy Shield
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- Google Pixel XL full, in-depth smartphone review: The new best Android phone
- Japan Robot, gadget and car expo slideshow
- Panasonic DX900U UHD 4K smart TV review: Best all-round TV ever?
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- FTBusiness Analyst - PermanentACT
- FTBusiness/Technical Consultant (CPM)QLD
- FTJunior Java DevelopersACT
- CCSenior Developer - C++/Perl/PythonNSW
- CCServiceNow ConsultantNSW
- CCProject Change ManagerNSW
- CCUX LeadNSW
- CCSenior Siebel Business AnalystACT
- FTSenior CISCO Network EngineerQLD
- CCSecurity Data ScientistVIC
- TPSenior Software EngineerQLD
- CCContract Analyst Programmer (JAVA/SQL/Web) 161026/AP/632Asia
- CCSenior Digital DesignerNSW
- FTSr. Insight SpecialistVIC
- TPEDRMS Project ManagerVIC
- FTSoftware DeveloperQLD
- CCProject Manager/Scrum MasterNSW
- FTMicrosoft Dynamics AX Finance ConsultantWA
- FTTechnical Support OfficerWA
- FTSenior Full Stack DeveloperNSW
- CCSiebel DeveloperACT
- CCProject Manger - Minor Works ProjectVIC
- CCApplication Performance Test Lead/ArchitectQLD
- CCSharePoint / Office365 DeveloperWA
- FTMicrosoft Dynamics AX Manufacturing ConsultantQLD