A survey of U.S. utilities shows many are facing frequent cyberattacks that could threaten a highly interdependent power grid supplying more than 300 million people, according to a congressional report.
Security researchers found serious vulnerabilities in the engines of several popular first-person shooter video games that could allow attackers to compromise their online servers and the computers of players accessing them.
A recent intrusion on the computer network of Norwegian telecommunications company Telenor was the result of a large cyberespionage operation of Indian origin that for the past few years has targeted business, government and political organizations f...
We all know that relying on a simple user ID and password combination is fraught with peril. One alternative is to use one of the single sign-on solutions we reviewed last year, but there are less expensive options that could also be easier to instal...
Yahoo Japan, the country's largest Web portal, said up to 22 million user IDs may have been leaked during a hack that was discovered last week.
Operators of two alleged tech support scams that charged consumers hundreds of dollars to supposedly fix their computers have settled charges from the U.S. Federal Trade Commission.
Italian police arrested four suspected hackers Friday, accusing them of having taken control of the Italian branch of the Anonymous network.
Security researchers from Trend Micro have uncovered an active cyberespionage operation that so far has compromised computers belonging to government ministries, technology companies, media outlets, academic research institutions and nongovernmental ...
Previously unknown Mac OS X spyware, signed with a valid Apple Developer ID, has turned up on the laptop of an activist from Angola at a human rights conference in Norway.
The computer virus seems to be making a subtle comeback.
Four British men associated with the LulzSec hacker collective received prison sentences Thursday for their roles in cyberattacks launched by the group against corporate and government websites in 2011.
Security researchers from Damballa have found a new variant of the Pushdo malware that's better at hiding its malicious network traffic and is more resilient to coordinated takedown efforts.
Internet traffic in and out of war-torn Syria has been restored after a disruption of nearly eight and a half hours, according to Internet traffic charts.
Russia on Wednesday took a step toward protecting private data by ratifying the so-called Convention 108, established in 1981 and legally binding in 45 countries.
Security researchers from Russian cybercrime investigations firm Group-IB have uncovered a cyberfraud operation that uses specialized financial malware to target the customers of several major Australian banks.
Most Popular Reviews
- 1 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
- 2 Sony Xperia XZ review: turbo-charged last-gen phone
- 3 Hisense Series 7 ULED 4K UHD TV review
- 4 Sony X9300D and X8500D UHD 4K TV review
- 5 Moto X Force review: Leading features from a mid-range phone
Join the PC World newsletter!
Latest News Articles
- WikiLeaks says it doesn’t collaborate with states
- AT&T, Time Warner deal under scrutiny from politicians, consumer groups
- Best Travel SIMs for Japan
- Why Melbourne Cup online betting servers win with Flash
- Chinese firm admits its hacked products were behind massive DDoS attack
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- Google Pixel XL full, in-depth smartphone review: The new best Android phone
- Japan Robot, gadget and car expo slideshow
- Panasonic DX900U UHD 4K smart TV review: Best all-round TV ever?
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- FTJava Developer - Canberra RoleNSW
- CCSolution DesignerVIC
- CCSenior Security AnalystVIC
- FTSolution Delivery ManagerVIC
- FTSolution ArchitectACT
- CCBuild and Release ManagerNSW
- CCSAS DI DeveloperNSW
- CCSenior Siebel Business AnalystACT
- FTOperational Integrity ManagerNSW
- CCQlikview DeveloperNSW
- CC.Net Sitecore DeveloperVIC
- CCContract Junior Programmer (J2EE/SQL) 161019/JP/552Asia
- CCSenior Developer - C++/Perl/PythonNSW
- FTSolutions ArchitectNSW
- FTSenior Architect | Perl | Linux |MySQL | Infrastructure | TelecomNSW
- FTCustomer Solutions Engineer | Voice | Data | TelcoNSW
- CCSenior Procurement SpecialistVIC
- CCContract Junior Programmer (Internet/ Intranet) 161025/JP/vhaAsia
- FTAX Functional ConsultantNSW
- CCSenior Siebel AnalystACT
- CCAutomation Test AnalystNSW
- CC.Net DeveloperWA
- FTSenior Analyst ProgrammerNSW
- FTProject ManagerSA