Until late January, Apple's App Store servers did not encrypt all communications with iOS clients, which exposed users to several potential attacks, according to a Google security researcher.
China's foreign minster on Saturday called on nations to cooperate on Internet security, rather than wage cyberwarfare, as he denied accusations in a recent report that the country's military was behind hacking attacks.
Mobile carriers should deploy a number of safeguards to protect their customers against a growing problem of unauthorized billing through mobile payments, the U.S. Federal Trade Commission said in a report released Friday.
Recent reports from antivirus companies seem to suggest that the number of Android malware threats is growing. However, there are still many skeptics who think that the extent of the problem is exaggerated.
German government officials including Chancellor Angela Merkel could soon be communicating about classified matters using BlackBerry Z10 smartphones equipped with a new micro-SD card from SecuSmart.
Kaspersky Lab's Internet Security 2013 product contains a bug that can be exploited remotely, especially on local networks, to completely freeze the OS on computers running the software.
Uniscon's IDgard, a service for securely exchanging documents between companies and their clients or partners, uses two-factor authentication and stores only its customers' encrypted data on the server, with no passwords or hashes for hackers to stea...
U.S. Attorney General Eric Holder has defended the role of the prosecution in the case of the late Internet activist and innovator Aaron Swartz, stating that "there was never an intention for him to go to jail for longer than a three, four, potential...
Deutsche Telekom launched a Web portal Wednesday that provides a real-time visualization of cyberattacks detected by its network of sensors placed around the world.
Three U.S. lawmakers have introduced a bill to provide more protection from government surveillance for people who store data in the cloud.
Professional social networking service LinkedIn won the dismissal of a lawsuit seeking damages on behalf of premium users who had their log-in passwords exposed as a result of a security breach of the company's servers last year.
A botnet that has been in the eye of researchers for years continues to serve up malware, spam and fake antivirus software, according to research by Trend Micro.
Evernote is speeding up its plans to offer two-factor authentication to users following a recent data breach that exposed user names, email addresses and encrypted passwords.
Spamhaus is warning marketers to keep their databases cleansed of bad email addresses lest their messages be mistaken for spam and blocked.
Some thousand-plus Google users have been subject to FBI security information requests since 2009, the company said Tuesday. The data build on Google's already existing tally of government data requests.
Most Popular Reviews
- 1 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 2 D-Link Taipan AC3200 Ultra tri-band modem-router review
- 3 BlackBerry Priv review: When old habits die hard
- 4 Dell XPS 13 (2016) review: Making the very best Ultrabook
- 5 Microsoft Surface Book review: The verdict on Microsoft's first notebook
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- Nasdaq to use blockchain to record shareholder votes
- Pwn2Own contest puts $75,000 bounty on VMware Workstation bypass
- Intel SSDs may get speed, capacity boost with new Micron chips
- Apple's iPhone sued for infringement of touch feedback patents
- Cyber criminals hack Netflix: Symantec
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTDigital Marketing Specialist | Media BuyerNSW
- CCJava Developer - Front/ Back EndVIC
- CCSAP Business Intelligence SpecialistQLD
- FTNetwork EngineerNSW
- CCProject Manager, Network, FinanceNSW
- FTVB6 DeveloperNSW
- CCIT Service Deliver & Improvement ManagerACT
- CCSenior Identity ManagerVIC
- CCMultiple Senior Business Analyst opportunitiesSA
- FTSoftware Developer - Ruby on RailsNSW
- FTSenior Portfolio Manager - IT ProjectsNSW
- FTNetwork Engineer | Canberra | NV1 NV2 clearance | Defence projectsVIC
- FTApplication Support AnalystVIC
- CCSolution ArchitectNSW
- CCSenior Business AnalystACT
- CCSenior Business Analyst - AdventedgeVIC
- CCOracle Business AnalystSA
- CCBusiness Project Manager - Transformation ProgramNSW
- CCOracle Developer - 3 month contractSA
- FTInternal Audit ConsultantACT
- CCService ModellerNSW
- CCContract Analyst Programmer 160120/AP/vvtAsia
- FTNetwork Engineer | NV1 NV2 clearance | Defence projects | Immediate interviewACT
- CCIT Service Improvement SpecialistNSW
- CCEnterprise ArchitectNSW