Researchers from security firm Trusteer have found a new variant of the Gozi banking Trojan program that infects a computer's Master Boot Record (MBR) in order to achieve persistence.
Cody Andrew Kretsinger, a 25-year-old man from Decatur, Illinois, was sentenced Thursday to one year in federal prison for his role in a May 2011 breach of a Sony Pictures website and database.
Wikileaks' latest release is billed as a transcript of a "secret meeting," but it may more accurately be termed a promotion.
A Russian porn site is delivering malware that uses the victims' computers to mine bitcoins, according to research from ThreatTrack Security.
The U.S. House of Representatives has voted to approve a controversial cyberthreat information-sharing bill, despite opposition from the White House and several privacy and digital rights groups.
Security researchers from Russian cybercrime investigations company Groub-IB have recently identified a new piece of malware designed to steal login credentials from specialized software used to trade stocks and other securities online.
Thirteen popular home and small office routers contain security problems that could allow a hacker to snoop or modify network traffic, according to new research.
The volume of mobile spam messages touting free gift cards sharply fell after the U.S. Federal Trade Commission (FTC) filed complaints in early March against eight companies, according to antispam vendor Cloudmark.
The U.S. House of Representatives moved closer Wednesday toward the passage of the Cyber Intelligence Sharing and Protection Act (CISPA), despite concerns that the cyberthreat information-sharing bill will allow Web-based companies to share a wide am...
Consumers often fail to perform transactions online due to authentication failure. But while they struggle, they also distrust websites with weak authentication procedures.
Following similar initiatives by Apple, Google and Facebook, Microsoft is enabling two-factor authentication for its Microsoft Account service, the log-on service for many of its online and desktop products.
The volume, duration and frequency of distributed denial-of-service (DDOS) attacks used to flood websites and other systems with junk traffic have significantly increased during the first three months of this year, according to a report released Wedn...
The chief sponsor of the Cyber Intelligence Sharing and Protection Act (CISPA) in the U.S. Congress has ignited a Twitter storm by suggesting many opponents of the proposed cyberthreat sharing bill are 14-year-olds in basements.
Smartphones with custom versions of Android offered by large mobile operators in the U.S. are not getting security updates as regularly as phones from Google, or smartphones from other vendors like Microsoft, according to a complaint by the American ...
Security vendor AVG has released an application for Android that lets users adjust power settings and manage applications to conserve battery power.
Gadgets & Things
Most Popular Reviews
- 1 Finally! LG OLED TV 2016 range review
- 2 Huawei Nova Plus smartphone review
- 3 Apple iPhone 7 Plus review: including Portrait Mode
- 4 Google Daydream View VR full, in-depth review
- 5 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
Join the PC World newsletter!
Latest News Articles
- Lavabit developer has a new encrypted, end-to-end email protocol
- Apple sues Qualcomm over patent licensing and $1B in payments
- New details emerge about Intel's super-small Euclid computer for robots
- Microsoft will soon end Office 2013 distribution through Office 365
- Researchers propose a way to use your heartbeat as a password
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- Time to ditch Foxtel and the iQ3: How to replace Foxtel packages with cheaper alternatives
- The top 10 best and worst tech gadgets and products of 2016
- TV of the year award 2016
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- FTBrand Marketing Manager - Premium Entertainment BrandNSW
- CCICT Contracts ManagerSA
- CCTechnical Business Analyst-DevOpsNSW
- TPSOA DeveloperNSW
- FTRegional Sales Manager - Telco/ICT - Employer of choiceQLD
- FTTechnical Consultant/Systems AnalystQLD
- CCSenior PMO Analyst - ReportingNSW
- TPDynamics CRM Technical Delivery ManagerVIC
- FTCheckpoint Firewall and VPNNSW
- CCTechnical Business Analyst - Infrastructure - VirtualizationNSW
- TPSenior Project Manager - Digital Application CX TransformationNSW
- CCMigration OfficerQLD
- FTLevel 2 Help Desk SupportQLD
- CCSolution Delivery Manager / Project ManagerNSW
- TPFinancial Project management - Multiple grant programsNSW
- CCDevops EngineerVIC
- FTPERMANENT Business AnalystsACT
- TPBusiness Project Manager IntegrationNSW
- FTSnr SOC Security Coordinator - Perm - North Ryde areaNSW
- FTiOS DeveloperNSW
- PTVBA Analyst Programmer - Permanent / Part Time (3 days per week)QLD
- CCNetwork Security Specialist - Palo Alto Firewall ExpertVIC
- FTFunctional ConsultantNSW
- CCService ManagerACT