It has been a week since hackers released software that could be used to attack a flaw in Windows Vista and Server 2008, but Microsoft and security companies say that criminals haven't done much with the attack.
Facebook will enhance its social-networking site's privacy features over the next 12 months as a result of a set of recommendations from the Canadian government.
Social networking services like Facebook and Twitter foster a false sense of security and lead users to share information which can be used by cybercriminals and social engineers. The very concept of social networking is based on connecting and shari...
As fireworks boomed on the Fourth of July, thousands of compromised computers attacked U.S. government Web sites. A botnet of more than 200,000 computers, infected with a strain of 2004's MyDoom virus, attempted to deny legitimate access to sites suc...
In June, the world watched as tweets from the streets of Tehran flooded Twitter. Frequent Twitter users--and people who hadn't even heard of the microblogging service--were suddenly and simultaneously witnessing its potential.
McAfee's latest version of its managed security service includes new features that let companies scan their Web sites for vulnerabilities as well as check for compliance with payment-card industry standards for handling financial data.
Microsoft has sued a Hong Kong seller of mobile ringtones, saying the company used phishing techniques to flood Microsoft Live Messenger users with spam messages.
Oracle on Tuesday released its latest quarterly patch update, which includes 10 security fixes for its database and also addresses a range of vulnerabilities across the vendor's applications portfolio.
In 1989, Eugene Kaspersky ran afoul of the Cascade virus while working for the Ministry of Defence in the heart of the Soviet Union. He defeated it with his wits and a pencil.
Open source security is a hot topic in the IT world. Some people believe that open source solutions are a potential playground for mischief-makers and cyber criminals, while others swear they’re safer than proprietary software.
Sometimes, it seems scams are becoming almost as common as social media experts on Twitter. The latest one, unleashed Monday morning and initially noticed by tech blog Mashable, centers on a fake blog hosted at the domain twittersblogs.com. Tweets co...
Forget spam and phishing as you once knew it: the new breed of cyber criminals are shifting their operations to fertile new fields, including mobile phones, online gaming and Web 2.0. These are the chief threats facing consumers today, and it's peril...
As German banks layer more security into their online banking procedures, security vendor Gemalto has launched a device it says makes completing transactions easier.
An overwhelming majority of Web sites promoted through spam are hosted in China at service providers that many times choose to ignore complaints and allow illegal activity, according to research from the University of Alabama.
A team of journalists investigating the global electronic waste business has unearthed a security problem too. In a Ghana market, they bought a computer hard drive containing sensitive documents belonging to U.S. government contractor Northrop Grumma...
Most Popular Reviews
- 1 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
- 2 Sony Xperia XZ review: turbo-charged last-gen phone
- 3 Hisense Series 7 ULED 4K UHD TV review
- 4 Sony X9300D and X8500D UHD 4K TV review
- 5 Moto X Force review: Leading features from a mid-range phone
Join the PC World newsletter!
Latest News Articles
- Samsung sales, profits dive on Note 7 recall
- Dyn DDoS attack came from 100,000 infected devices
- These are the 3 big reveals from Microsoft's Surface event
- AI and robots aren't gunning for your job, White House economist says
- DDoS attacks from webcams, routers hit Singapore's StarHub
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- Google Pixel XL full, in-depth smartphone review: The new best Android phone
- Japan Robot, gadget and car expo slideshow
- Panasonic DX900U UHD 4K smart TV review: Best all-round TV ever?
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- CCDatacenter EngineerNSW
- CCContract IT Assistant (UNIX/Windows) 161028/ITA/003Asia
- CCCisco Wi-Fi Network Engineer - SurveyorNSW
- CCSolution Architect - BRISBANE BASEDQLD
- FTMULTIPLE PERM PROJECT MANAGERSACT
- CCSenior Security AnalystVIC
- CCContract Senior IT Assistant (Lotus Notes) 161101/SITA/571Asia
- TPProject Manager - ApplicationsQLD
- FTMid to senior Java Software EngineerNSW
- FTMicrosoft Dynamics AX Functional Consultant Advanced Warehouse ManagementNSW
- CCSenior Java Analyst Programmer - Front Office TradingNSW
- FTSenior programmer / ProgrammerAsia
- FTBI Developer-Micro-strategyNSW
- FTSolution Architect with end user computing (EUC) experienceNSW
- TPBusiness Systems AnalystQLD
- FTBusiness Analyst - PermanentACT
- FTMigration Release ManagerACT
- CCSAP FunctionalistACT
- CCContract Junior Programmer (PC LAN Support) 161028/JP/203Asia
- TPICT Security SpecialistQLD
- TPDev Ops SpecialistWA
- FTScrum MasterNSW
- FTMicrosoft Dynamics AX Manufacturing ConsultantNSW
- FTBusiness Analyst - Health Industry - Melbourne CBDVIC