The computer virus seems to be making a subtle comeback.
Four British men associated with the LulzSec hacker collective received prison sentences Thursday for their roles in cyberattacks launched by the group against corporate and government websites in 2011.
Security researchers from Damballa have found a new variant of the Pushdo malware that's better at hiding its malicious network traffic and is more resilient to coordinated takedown efforts.
Internet traffic in and out of war-torn Syria has been restored after a disruption of nearly eight and a half hours, according to Internet traffic charts.
Russia on Wednesday took a step toward protecting private data by ratifying the so-called Convention 108, established in 1981 and legally binding in 45 countries.
Security researchers from Russian cybercrime investigations firm Group-IB have uncovered a cyberfraud operation that uses specialized financial malware to target the customers of several major Australian banks.
Just 11 days after issuing an advisory, Microsoft has released a patch for a bug in Internet Explorer 8 that bedeviled the U.S. Department of Labor earlier this month.
Adobe has released scheduled security updates for its Reader, Acrobat, Flash Player and ColdFusion products on Tuesday in order to fix many critical vulnerabilities, including one that is already actively exploited by attackers.
The Android threat landscape is growing in both size and complexity with cybercriminals adopting new distribution methods and building Android-focused malware services, according to a report from Finnish security vendor F-Secure.
China's reputation for security may have been marred by recent U.S. accusations of state-sponsored hacking but the nation is still a safe place as a tech subcontractor for foreign businesses, according to one of China's largest IT outsourcing vendors...
Intel is introducing new ideas to secure the public cloud, offering a service in which online files can be accessed after users are verified by an authentication scheme including face and voice recognition.
Hackers are finding it pays to call ahead before sending malware-laden email.
Mobile security vendor Lookout plans to start flagging as adware mobile apps that use aggressive ad networks if they don't obtain explicit consent from users before engaging in behavior that potentially invades privacy.
Kim Dotcom has ordered the removal from his Mega file-storage service design plans for a controversial one-bullet plastic gun.
Colleges and universities are being encouraged to scrutinize their systems to keep them from being hijacked in DDoS (distributed denial-of-service) attacks.
Most Popular Reviews
- 1 Samsung Galaxy Note 7 review
- 2 Portable power: Venom Blackbook 13 Zero review
- 3 Alcatel Idol 4S review: King of the mid-range?
- 4 Witness a 241% Australian price hike: Dell Latitude 7370 review
- 5 Is this the best value phone on the market? Moto G4 Plus review
Join the PC World newsletter!
Latest News Articles
- HP's Elite Slice mini-PC stacks up features with snap-on modules
- The Dropbox data breach is a warning to update passwords
- Panasonic's new 4K camcorder does better in low light
- Lenovo adds Google Daydream products to its roadmap
- Lenovo will ditch hard keyboards in planned Chromebook and 2-in-1s
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCBig Data SpecialistNSW
- FTMiddleware - DevOps EngineerVIC
- CCSoftware Engineer - Linux with NV1 clearanceVIC
- CCContract Systems Analyst (Infrastructure/JAVA) 160901/SA/486Asia
- CCFacilities ManagerACT
- CCContract Analyst Programmer (JAVA/J2EE/SQL) 160824/AP/187Asia
- CCProgram SchedulerVIC
- CCICT Contracts ManagerSA
- CC.Net DeveloperWA
- CCSenior Security Specialist - McAfeeVIC
- CCBusiness AnalystNSW
- CCSoftware test engineer - Telecom/NetworkACT
- CCContract Analyst Programmer (JBoss/J2EE/SQL) 160830/AP/193Asia
- CCSenior Project Manager - TelecommunicationVIC
- CCDevOps EngineerVIC
- CCProject ManagerACT
- FTOrchestration Engineer - DevOps - PuppetVIC
- CCEmail Production SpecialistNSW
- CCContract Programmer (JAVA/HTML/PHP) 160819/P/733Asia
- CCDevOps Engineer - Php, LAMP, XML, scripting, JavaNSW
- CCCustomer Service SpecialistVIC
- FTClient Engagement ManagerVIC
- CCHead of Enterprise Organisational Change- GovernanceNSW
- CCSenior Integration Specialist - IP NetworkVIC
- CCSenior Business Analyst - GeneralVIC