The recent release of the BlackBerry 10 operating system sets the stage for a security evolution as well, according to Alex Manea, manager of security services at BlackBerry.
Russian Web search firm Yandex launched a public DNS (Domain Name System) resolution service on Thursday that leverages the company's existing website scanning technology to block access to malicious and adult-rated sites.
Security vendor Sophos has released an update for the software used on its Web gateway security appliance in order to address three serious vulnerabilities in the product's Web-based user interface.
Two of Japan's major Internet portals were hacked earlier this week, with one warning that as many as 100,000 user accounts were compromised, including financial details.
The largest bitcoin exchange said Thursday it is fighting an intense distributed denial-of-service attack it believes is intended at manipulating the price of virtual currency, which has seen volatile price swings in the past few days.
An online bitcoin storage service, Instawallet, said Wednesday it is accepting claims for stolen bitcoins after the company's database was fraudulently accessed.
U.S. lawmakers need to make significant changes to a controversial cyberthreat information sharing bill because the legislation could be used to give federal intelligence agencies backdoor wiretapping powers, the Center for Democracy and Technology s...
The U.S. government agency leading an effort to create a voluntary cybersecurity framework for companies operating critical infrastructure wants to hear ideas about what to include in those standards.
Organizations face malware-related events that bypass traditional defense technologies on their networks every three minutes, according to a new report released Wednesday by security vendor FireEye.
An online electronics retailer, Bitcoinstore, has had such a successful trial run accepting only bitcoins for payment that it will continue operating.
Researchers from security vendor FireEye have uncovered a new APT (advanced persistent threat) that uses multiple detection evasion techniques, including the monitoring of mouse clicks, to determine active human interaction with the infected computer...
An analysis of a piece of Android spyware targeting a prominent Tibetan political figure suggests it may have been built to figure out the victim's exact location.
The authors of police-themed ransomware have started using the browsing histories from infected computers in order to make their scams more believable, according to an independent malware researcher.
A flaw in the widely used BIND DNS (Domain Name System) software can be exploited by remote attackers to crash DNS servers and affect the operation of other programs running on the same machines.
Most Popular Reviews
- 1 Samsung Galaxy Note 7 review
- 2 Portable power: Venom Blackbook 13 Zero review
- 3 Alcatel Idol 4S review: King of the mid-range?
- 4 Witness a 241% Australian price hike: Dell Latitude 7370 review
- 5 Is this the best value phone on the market? Moto G4 Plus review
Join the PC World newsletter!
Latest News Articles
- HP's Elite Slice mini-PC stacks up features with snap-on modules
- The Dropbox data breach is a warning to update passwords
- Panasonic's new 4K camcorder does better in low light
- Lenovo adds Google Daydream products to its roadmap
- Lenovo will ditch hard keyboards in planned Chromebook and 2-in-1s
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCTechnical Business Analyst- BABOK,Infrastructure, Banking bkgndNSW
- FTBack End Developer - Java, Spring, RESTNSW
- FTIT Infrastructure EngineerSA
- CCSAP HCM / HR -Sr. Business AnalystNSW
- CCCustomer Service RepresentativeQLD
- CCTechnical WriterACT
- CCContract Systems Analyst (.Net/SQL Server) 160829/SA/244Asia
- CCSolution Architect - POSVIC
- CCSenior Business Analyst - GeneralVIC
- CCBusiness AnalystNSW
- CCPersonal AssistantVIC
- CCSenior Project Manager - TelecommunicationVIC
- FTIT Manager - Infrastructure Strategy and OperationsNSW
- CCAsset Transfer Specialist | TelecommunicationVIC
- FTPMO SpecialistACT
- CCProject Resource SpecialistVIC
- CCSr IT Support specialist - MCSE- L2/L3- Travelling requiredNSW
- CCData Centre Solutions Architect - Red Hat, Wintel & VMware - CanberraACT
- CCContract Analyst Programmer (IT Application/Web) 160825/AP/183Asia
- CCContract Analyst Programmer (JAVA/SQL) 160824/AP/531Asia
- CCProject Coordinator (Paying $400-$450 per day)NSW
- CCData/ Business AnalystVIC
- CCNetwork Implementation EngineerNSW
- CCSenior Technology Specialist - Back-end Java/JEENSW
- FTTandem/NonStop Technical ConsultantWA