The stolen credit card numbers of millions of Target shoppers took an international trip -- to Russia.
A new piece of malware designed to delete files from hard disk drives and render computers unable to boot targets South Korean users, according to researchers from security firm Symantec.
A recent targeted attack that used Chinese malware compromised over 1,000 computers belonging to dozens of South Korea organizations, according to researchers from Israeli security firm Seculert.
Attackers are using fake versions of a recently released report about a Chinese cyberespionage group as bait in new spear-phishing attacks that target Japanese and Chinese users.
The hundreds of government, military and research organizations targeted in a large-scale cyberespionage operation dubbed Red October were not only attacked using malicious Excel and Word documents as previously believed, but also by using Web-based ...
A new piece of malware that deletes entire partitions and user files from infected computers has been found in Iran, according to an alert issued Sunday by Maher, Iran's Computer Emergency Response Team Coordination Center (CERTCC).
Researchers from Israel-based IT security firm Seculert have uncovered a custom-made piece of malware that infected hundreds of point-of-sale (PoS) systems from businesses in 40 countries in the past few months and stole the data of tens of thousands...
A dangerous piece of malicious code responsible for stealing money from online bank accounts is being updated with new functions after its source code was leaked earlier this year, according to security researchers.
When McAfee released its <a href="http://www.mcafee.com/us/resources/white-papers/wp-operation-shady-rat.pdf">Operation Shady Rat hacking report</a> earlier this week, it didn't name all of the organizations it thought could have been hacked as part ...
Cybercriminals are taking a page from the software-as-a-service playbook: they're now selling exploit kits complete with hosting services, with customers paying for the length of time the exploits are actively infecting computers.
The rumored combination of two pieces of advanced online banking malware appears to be fully underway after several months of speculation.
A piece of banking malware that researchers have been keeping an eye on is adding more sophisticated capabilities to stay hidden on victims' PCs, according to the vendor Seculert.
A group of malicious hackers who attacked Twitter and the Chinese search engine Baidu are also apparently running a for-rent botnet, according to new research.
Most Popular Reviews
- 1 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 2 D-Link Taipan AC3200 Ultra tri-band modem-router review
- 3 BlackBerry Priv review: When old habits die hard
- 4 Dell XPS 13 (2016) review: Making the very best Ultrabook
- 5 Microsoft Surface Book review: The verdict on Microsoft's first notebook
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- Samsung hopes Raspberry Pi can spread Tizen OS adoption
- 5G dreams in Barcelona: Cars, robots and VR games
- VMware gives enterprises a BYOD boost with three new tools
- Google adds warning to unencrypted emails
- Intel's Itanium to live an as HPE commits to new servers with the chip
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTDigital Marketing Specialist | Media BuyerNSW
- CCLevel 2 Helpdesk, Service Support- Remedy or SAP backgroundNSW
- CCSenior Systems Engineer - SCOM/SCCM/PowerShellVIC
- CCIT Solution DesignerNSW
- FTSenior Consultant | Project work | National Systems IntegratorNSW
- CCiOS DeveloperNSW
- CCContract System Analyst (Network & System Mgt.) 160205/SA/561Asia
- FT.NET DeveloperVIC
- CCTechnical Lead - .NET TechnologiesACT
- FTSenior Business ConsultantNSW
- CCBusiness Analyst - CanberraNSW
- CC.NET DeveloperACT
- CCSenior Project Manager - Cloud / Telecommunications (Melb CBD)VIC
- FTTechnical Lead (Java)NSW
- CCChange LeadNSW
- FTSoftware Developer - Ruby on RailsNSW
- CCWeb DeveloperNSW
- CCAngularJS DeveloperNSW
- FTChange LeadNSW
- CCHelpdesk SupportNSW
- CCProject Manager IT infrastructureACT
- CCContract System Analyst (JAVA/J2EE/SQL) 160205/SA/881Asia
- CCHigh Level Network Engineer (Communications)WA
- FTPrincipal Business Analyst (SQL/SAS)NSW