Senator Patrick Leahy questioned how the Constitution allows the National Security Agency's bulk collection of U.S. telephone records and repeated his calls for President Barack Obama's administration to end the program during a hearing Wednesday.
The German government and the German Federal Intelligence Service are facing legal action because they allegedly aided the U.S. National Security Agency (NSA) data collection program.
Critics of the U.S. National Security Agency's U.S. telephone records program are missing the point when they say the agency can't point to one case where the collection was critical to preventing terrorism, two people formerly involved with the prog...
A vulnerability in Android allows malicious applications to bypass an active VPN (virtual private network) connection and force traffic from the device through an attacker-controlled system where it can be intercepted, according to security researche...
Some of the most prominent cryptography and security researchers in U.S. academia have condemned the U.S. National Security Agency's surveillance practices and called for change.
Eleven people were charged in the U.S., India, China and Romania for their suspected involvement with websites offering email hacking services.
A Romanian man was arrested this week under suspicion that he is the hacker known online as Guccifer who hacked into the online accounts of various public figures and politicians, including former U.S. Secretary of State Colin Powell and members of t...
The software used by many wireless IP cameras manufactured by Foscam Digital Technologies have a vulnerability that allows remote users to access their video streams and take snapshots without proper authentication.
The U.S. National Security Agency should abandon its collection of U.S. telephone records because the surveillance program is illegal, a government privacy oversight board said.
In a report to be released Thursday, the U.S. Privacy and Civil Liberties board says the National Security Agency's bulk collection of phone records is illegal and should stop, according to the New York Times and the Washington Post, which received a...
Technology is not evil, only its use or misuse.
Google, through its plan to link Gmail addresses to its Google+ social network, is violating a privacy agreement the company made with the U.S. Federal Trade Commission, a long-time critic of the company's privacy practices said in a complaint to the...
Computer scientists found almost 20 exit relays in the Tor anonymity network that attempted to spy on users' encrypted traffic using man-in-the-middle techniques.
Verizon Communications received more than 320,000 requests for customer information from U.S. federal, state and local law enforcement agencies in 2013, more than 100 times the number of requests from any other country, the telecom carrier said in it...
Twelve U.S. companies, including Internet service provider Level 3 Communications and BitTorrent, the company behind the popular peer-to-peer file-sharing protocol, have agreed to settle U.S. Federal Trade Commission charges that they falsely claimed...
Most Popular Reviews
- 1 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 2 D-Link Taipan AC3200 Ultra tri-band modem-router review
- 3 Dell XPS 13 (2016) review: Making the very best Ultrabook
- 4 Microsoft Surface Book review: The verdict on Microsoft's first notebook
- 5 Telstra Wi-Fi 4GX Advanced III review: Testing the world's first 600Mbps wireless hotspot
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- Maps of Google and other services could require security clearance in India
- Google, Honeywell resolve patent dispute over Nest thermostats
- FTTN revenue begins to trickle in for NBN
- HP partners with Intel to invigorate STEM (+4 photos)
- NBN set to hit 1 million connections
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FT.NET DeveloperWA
- CCJava Developer / DevOps | FINEOS Application | Long Term ContractNSW
- CCInstructional DesignerQLD
- CCDesktop Engineer, renewable contractAsia
- FTSharePoint DeveloperSA
- CCProject Coordinator- PRINCE2 & Portal/Website/Digital bckgNSW
- CCWebOps EngineerVIC
- FTGeneral Manager: Applications DevelopmentVIC
- CCSAP BASIS ConsultantVIC
- CCBusiness Analyst - Digital/Financial ServicesNSW
- CCAdobe Experience Manager AEM / CQ5 DeveloperNSW
- CCSenior UX/UI DesignerNSW
- CCUAT Test AnalystWA
- CC.NET Developer (Application production Support)NSW
- FTSenior Business Intelligence ManagerNSW
- CCSenior Project Manager - HealthcareVIC
- CCContract Analyst Programmer (JAVA/SQL/J2EE) 160511/AP/522Asia
- FTSenior Change Manager - Capital MarketsNSW
- CCSenior Project ManagerNSW
- CCNV1 | System admin with SQL server experience for Defence Application SupportACT
- CCBusiness AnalystSA
- CCContract Programmer (JAVA/HTML/SQL) 160421/P/903Asia
- CCOperational Team LeadVIC
- CCFront end web developer - JUNE / JULY STARTACT
- CCEnterprise Architect (Security)NSW