Next time you turn off your Android phone, you might want take the battery out just to be certain.
VirusTotal, a Google-owned online malware scanning service, is creating a whitelist of products from large software vendors to reduce bad detections by antivirus programs.
Security-conscious IT leaders already have a rocky romance with the BYOD trend, and as Valentine's day approaches it's emerged that lonely-heart employees could be putting company data up for grabs by using dating apps.
A team of hackers that target governments, the military and journalists has turned its attention to the iPhone, according to Trend Micro.
Google has done a good job at keeping data-stealing Trojan apps out of Google Play, but attackers still find ways to monetize rogue apps through the store.
When restrictive IT policies push employees to personal smartphone apps to share corporate data, the security of that information is at risk. On Wednesday, MobileIron will release an update to its Content Security Service that seeks to plug that hole...
Samsung Electronics and Good Technology hope to convince more enterprises to use Android-based smartphones and tablets, with the help of a joint offering designed to protect the OS, applications and data.
The SilentText secure messaging application bundled with Blackphone had a serious vulnerability that would have allowed attackers to decrypt messages, read contact information, gather location data and even execute malicious code on the phone.
Samsung Electronics smartphones and tablets protected using the company's Knox security technology have been integrated with VPNs from Cisco Systems, giving enterprises more options for communicating securely.
A vulnerability in the IBM Endpoint Manager for mobile devices could allow attackers to execute malicious code on the servers used by companies to manage devices.
An Android Trojan program that's behind one of the longest running multipurpose mobile botnets has been updated to become stealthier and more resilient.
Android users in Melbourne’s CBD are the most at risk sector of the community for malware threats according to a report released by F-secure.
Security researchers have discovered a vulnerability in iPhones and iPads that allows attackers to install fake apps that take the place of legitimate ones.
Attackers have used rogue applications for both OS X and Windows to infect iPhones and iPads in China with a malware program that steals contact information and other private data.
There's a scary new piece of malware that collects call logs, phone-book contacts and other sensitive information from Apple iPhones and iPads. Should you be worried?
Gadgets & Things
Most Popular Reviews
- 1 Finally! LG OLED TV 2016 range review
- 2 Huawei Nova Plus smartphone review
- 3 Apple iPhone 7 Plus review: including Portrait Mode
- 4 Google Daydream View VR full, in-depth review
- 5 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
Join the PC World newsletter!
Latest News Articles
- Lavabit developer has a new encrypted, end-to-end email protocol
- Apple sues Qualcomm over patent licensing and $1B in payments
- New details emerge about Intel's super-small Euclid computer for robots
- Microsoft will soon end Office 2013 distribution through Office 365
- Researchers propose a way to use your heartbeat as a password
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- Time to ditch Foxtel and the iQ3: How to replace Foxtel packages with cheaper alternatives
- The top 10 best and worst tech gadgets and products of 2016
- TV of the year award 2016
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- FTBrand Marketing Manager - Premium Entertainment BrandNSW
- FTIT Project CoordinatorVIC
- CCVirtualization ArchitectACT
- FTLevel 3 EngineerNSW
- FTMicrosoft Systems EngineerVIC
- TPLevel 3 Systems EngineerWA
- FTFull stack Developer - Senior (Java or C# and AngularJS) x 3QLD
- FTITCM EngineerNSW
- CCTechnical Business Analyst - Infrastructure - VirtualizationNSW
- TPSenior Test Analyst - TAFEQLD
- FTSenior .Net DeveloperVIC
- CCSecurity AnalystACT
- FT.NET CMS DeveloperWA
- TPAndroid DeveloperSA
- CCJava Developer/ Guidewire DevelopersQLD
- FTLevel 3 EngineerNSW
- FTApplication Developer - FileNetNSW
- CCBusiness AnalystNSW
- CCChange Manager - O365 Upgrade ProjectQLD
- CCSAP HR/ Payroll Support ConsultantNSW
- FTMicrosoft Dynamics AX Finance ConsultantQLD
- FTMid Level Infrastructure Project ManagerVIC
- CCSenior Technical Specialist - AIXVIC
- TPBI Data AnalystQLD
- FTSolutions Architect - Data Centre/ NetworkACT