Malicious advertisements made their way last week to almost two dozen popular websites and used browser-based exploits to infect computers with CryptoWall, a nasty file-encrypting ransomware program.
Google is letting users protect their accounts against password compromises by adding support for two-factor authentication based on physical USB keys.
If you haven't updated your Flash Player with the fixes released on Oct. 14, you may be vulnerable to new attacks using a commercial exploit kit called Fiesta, security researchers warn.
Users who are careful to download files only from trusted websites may be tricked by a new type of Web vulnerability: this one cons them into downloading malicious executable files that are not actually hosted where they appear to be.
Hackers claim to have stolen a database of almost 7 million Dropbox log-in credentials, but the company says its service was not hacked and that unrelated websites are the data source.
Many security experts feel that passwords are no longer sufficient to keep online accounts safe from hackers, but we're still a long way from widespread adoption of biometrics and alternative methods of authentication.
More and more websites are looking to enable SSL encryption to protect their visitors from eavesdroppers and hackers. Now web infrastructure company CloudFlare will make it a bit easier by adding that feature to the free version of its hosting servic...
Google, Dropbox and the Open Technology Fund are supporting a new organization focused on making open-source security and privacy tools more user-friendly.
Nine months after revealing plans to develop a decentralized and encrypted chat application, BitTorrent has opened public testing for Windows, Mac and Android versions of the program Wednesday.
Twitter's recently announced bug bounty program has helped the company identify and patch a serious vulnerability that could have potentially disrupted advertising on its platform.
The default browser in Android versions older than 4.4 has a vulnerability that allows malicious websites to bypass a critical security mechanism and take control of a user's authenticated sessions on other sites.
A software development project launched Monday aims to create free tools that simplify the encryption of online forms of communication like email, instant messaging, SMS and more by solving the complexity associated with the exchange and management o...
A critical vulnerability in a popular e-commerce extension for the Joomla content management system allows malicious users to gain super-admin privileges to sites that run the software.
An archive containing nearly 5 million Gmail addresses and plain text passwords was posted Tuesday on an online forum, but the data is old and likely sourced from multiple data breaches according to one security firm.
Adobe Systems released a critical security update for Flash Player that fixes 12 security vulnerabilities, but pushed back its planned patches for Reader and Acrobat by a week.
Most Popular Reviews
- 1 Hisense Series 7 ULED 4K UHD TV review
- 2 Samsung Galaxy Note 7 review
- 3 Portable power: Venom Blackbook 13 Zero review
- 4 Alcatel Idol 4S review: King of the mid-range?
- 5 Samsung Galaxy S7 Edge Review
Join the PC World newsletter!
Latest News Articles
- You can now use an iPhone to log into a Windows 10 PC, Microsoft says
- Android malware that can infiltrate corporate networks is spreading
- Firefox blocks websites with vulnerable encryption keys
- Ransomware spreads through weak remote desktop credentials
- Linksys EA9500 Max-Stream AC5400 MU-MIMO Gigabit router review
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTTechnical Business Analyst | Marketing ServicesNSW
- CCIT Security ArchitectACT
- FTOutbound TelesalesVIC
- FTOutbound TelesalesVIC
- CCBusiness Analyst - Telecom ProjectNSW
- FTBackup ConsultantWA
- FTTeam Leader Full Stack, Python, FinanceNSW
- CCContract Systems Analyst (IT Security) 160928/JP/653Asia
- FTNetApp Storage ConsultantWA
- CCeCommerce Project ManagerNSW
- FTInfrastructure Solutions ArchitectACT
- CCJava / J2ee ProgrammersACT
- CCInformatica Developer (MDM)NSW
- CCPMO AnalystNSW
- CCSecurity Cleared IT Professionals - Expression of InterestSA
- CCDigital Solutions ManagerNSW
- CCFull Stack Application Developer - IoT projectsVIC
- FTTechnical Support Engineer | Cloud | Automation techsNSW
- CCContract Web Developer (160915/WD/vmp)Asia
- CCVideo Conference Support Officer- VoIP, LAN, WAN, RemedyNSW
- CCBusiness Analyst with change management experienceACT
- FTMDM EngineerNSW
- CCAcquisition Marketing Executive - B2BNSW
- CCSenior Business Analyst -Change and SAP ProcurementNSW
- CCSolution ArchitectQLD