China's reputation for security may have been marred by recent U.S. accusations of state-sponsored hacking but the nation is still a safe place as a tech subcontractor for foreign businesses, according to one of China's largest IT outsourcing vendors...
Intel is introducing new ideas to secure the public cloud, offering a service in which online files can be accessed after users are verified by an authentication scheme including face and voice recognition.
Hackers are finding it pays to call ahead before sending malware-laden email.
Mobile security vendor Lookout plans to start flagging as adware mobile apps that use aggressive ad networks if they don't obtain explicit consent from users before engaging in behavior that potentially invades privacy.
Kim Dotcom has ordered the removal from his Mega file-storage service design plans for a controversial one-bullet plastic gun.
Colleges and universities are being encouraged to scrutinize their systems to keep them from being hijacked in DDoS (distributed denial-of-service) attacks.
A vast debit card fraud scheme that allegedly netted $US45 million has been linked to the hacking of credit card processors in the US and India.
Hackers who commandeered The Onion's Twitter account used simple but effective phishing attacks to obtain passwords, according to a writeup by the publisher's technology team.
New legislation introduced by a group of U.S. lawmakers would require mobile application developers to obtain consent from consumers before collecting their personal data and to secure the data they collect.
Adobe has warned users of its ColdFusion application server platform of a critical vulnerability that could give unauthorized users access to sensitive files stored on their servers.
Domain registrar Name.com forced its customers to reset their account passwords on Wednesday following a security breach on the company's servers that might have resulted in customer information being compromised.
Microsoft has released a temporary fix for a zero-day vulnerability in Internet Explorer 8, which was used by hackers in a prominent attack against the U.S. Department of Labor's website.
Intruders used to creep in through ventilation ducts. Now they break in using the software that controls the ventilation.
The U.S. military's reliance on foreign-made products, including telecommunications equipment and semiconductors, is putting the nation's security at risk by exposing agencies to faulty parts and to the possibility that producing nations will stop se...
Two U.S. senators will push Congress or President Barack Obama's administration to pursue trade and immigration sanctions against China and other countries that allegedly support cyberattacks on U.S. government agencies and businesses, the lawmakers ...
Most Popular Reviews
- 1 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 2 D-Link Taipan AC3200 Ultra tri-band modem-router review
- 3 Dell XPS 13 (2016) review: Making the very best Ultrabook
- 4 Microsoft Surface Book review: The verdict on Microsoft's first notebook
- 5 Telstra Wi-Fi 4GX Advanced III review: Testing the world's first 600Mbps wireless hotspot
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- Dell's private buyout shortchanged shareholders, court rules
- Atari's going to build IoT devices that talk over a low-power network
- Marketo gets scooped up into the private world for US$1.79 billion
- Kaby Lake starts strong as Intel retools PC strategy
- OEM software update tools preloaded on PCs are a security mess
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCSenior BA - Enterprise DataNSW
- FTHadoop Operation EngineerNSW
- CCContract Analyst Programmer (.NET C#/MS ASP .NET) 160526/AP/263Asia
- FTTest AnalystVIC
- CCService Desk analystSA
- CCContract Systems Analyst (Linux/Orcale/MySQL) 160531/SA/253Asia
- FTSenior Full-Stack .NET DeveloperVIC
- CCMS Dynamics CRM ConsultantVIC
- CCProject SpecialistVIC
- CCSenior IT Security Specialist-SANS, ISC2, ISACA, ITILNSW
- CCTechnical System Engineer (Linux/Mobile/SQL)160524/TSE/vmtAsia
- FTPerformance Test AnalystNSW
- CCDelivery Manager - Integration SpaceVIC
- FTLinux Infrastructure EngineerVIC
- CCSenior Project ManagerVIC
- CCDeployment Engineer / IT AuditorQLD
- FTSystems EngineerACT
- FTInfrastructure Specialist - Sec Ops Network & OSAsia
- FTStorage SpecialistVIC
- CCProjects Resource/ Workforce ManagerVIC
- CCSoftware Licensing AnalystVIC
- CCIT Environment and Deployment SpecialistQLD
- FTSenior Java DeveloperWA
- CCProject Manager / Delivery Manager - TelcoNSW
- CCContract Analyst Programmer (JAVA/SQL) 160606/AP/251Asia