Prime Minister Malcolm Turnbull has indicated that the government will work with the private sector to counteract the use of encryption technologies by criminals, invoking the now-resolved standoff between Apple and the FBI over the issue.
Prime Minister Malcolm Turnbull this morning officially launched the federal government’s national cyber security strategy.
Oracle's latest quarterly security update contains 136 fixes for flaws in a wide range of products including Oracle Database Server, E-Business Suite, Fusion Middleware, Oracle Sun Products, Java and MySQL.
Neither humans nor AI has proven overwhelmingly successful at maintaining cybersecurity on their own, so why not see what happens when you combine the two?
A group of cybercriminals have combined two powerful malware programs to create a new online banking Trojan that has already stolen million dollars from customers of 24 US and Canadian banks.
Microsoft wants a federal court to invalidate part of a 1986 law that it alleged has been abused by the government when authorities demand customers' data.
Ransomware authors are using the bitcoin blockchain, which serves as the cryptocurrency's public transaction ledger, to deliver encryption keys to users.
Faced with few options, companies are increasingly ceding to cyberattackers' demands for payment after holding their stolen data hostage, while law enforcement struggles to catch nearly invisible foes.
Fifty-four zero-day vulnerabilities were discovered last year, according to a report released this morning by Symantec, more than double that of 2014, and the number of megabreaches of more than 10 million records also hit a record high.
Security experts have devised a method that allows users to recover data from computers infected with the Petya ransomware program without paying money to cybercriminals.
A proposal from two senior U.S. senators would force tech companies to give technical assistance to law enforcement agencies trying to break into encrypted devices.
A start-up company called Karamba Security has developed malware prevention technology for the externally connected electronic control units (ECUs) found in cars.
The system piggybacks onto your existing wiring to add a motion sensor, wireless on/off switch, a two-way intercom, and a siren to scare intruders away.
An alternate method for infecting computers with ransomware signals a shift in tactics by cybercriminals that could put businesses at greater risk, according to Symantec.
Security researchers have expanded and improved the three-year-old BREACH attack that exploits the HTTP compression mechanism in order to recover sensitive information such as authentication cookies from encrypted Web traffic.
Most Popular Reviews
- 1 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 2 D-Link Taipan AC3200 Ultra tri-band modem-router review
- 3 Dell XPS 13 (2016) review: Making the very best Ultrabook
- 4 Microsoft Surface Book review: The verdict on Microsoft's first notebook
- 5 Telstra Wi-Fi 4GX Advanced III review: Testing the world's first 600Mbps wireless hotspot
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- New Microsoft beta lets workers build their own apps without coding
- Intel is on the verge of exiting the smartphone and tablet markets after cutting Atom chips
- 5 (more) reasons to be a data scientist
- FCC wireless auction hits spectrum target, paving way for fast, reliable 5G
- IBM offers advice on how to secure blockchain in the cloud
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTTechnical/Solutions ArchitectNSW
- CCAnalyst Programmer (JAVA/Windows Programming) 160428/AP/143Asia
- FTTechnology Risk ManagerNSW
- FTAzure ArchitectQLD
- FTSupplier Relationship ManagerVIC
- FTSenior Project Manager - Payroll IntegrationVIC
- FTSystem EngineerACT
- CCInfra Project Manager-Data Center, Cloud, Storage, NetworkNSW
- CCSCCM - SCOM - AD Systems EngineerNSW
- CCSenior DevOps ConsultantVIC
- CCSCRUM MasterNSW
- FTPMO AnalystNSW
- CCSenior Master Data OfficerNSW
- CCSenior Project Manager, Technology Upgrade & RefreshNSW
- CCData AnalystVIC
- CCSolutions Architect - Network and InfrastructureNSW
- CCSenior ICT Project OfficerACT
- CCSql Server Database Administrator (SAP)QLD
- FTProduction ConsultantVIC
- CCFront End Developer x 2QLD
- CCAWS ArchitectNSW
- CCOperational Team LeadVIC
- CCAEM DeveloperVIC
- CCService DeskWA
- CCSenior Technical WriterVIC