A proposal in the U.S. Congress to strengthen the penalties in the Computer Fraud and Abuse Act is a "giant leap in the wrong direction" for digital rights activists calling for changes in the law after the suicide of hacktivist Aaron Swartz earlier ...
Most browser installations use outdated versions of the Java plug-in that are vulnerable to at least one of several exploits currently used in popular Web attack toolkits, according to statistics published Monday by security vendor Websense.
Security researchers from antivirus vendor Kaspersky Lab have identified a targeted email attack against human rights and political activists that distributed a custom Android Trojan app with information-stealing capabilities.
The amount of data in the world is increasing exponentially, doubling every 18 months. Here are 10 real-world Big Data deployments you may not have realized were driven by big data.
From mini storage arrays to IP cameras to print servers, these 10 hardware devices will help you run your small business more efficiently whether you're in the office or hitting the road to close a deal.
A new version of the TDL rootkit-type malware program downloads and abuses an open-source library called the Chromium Embedded Framework that allows developers to embed the Chromium Web rendering engine inside their own applications, according to sec...
A new piece of custom malware sold on the underground Internet market is being used to siphon payment card data from point-of-sale (POS) systems, according to security researchers from antivirus vendor McAfee.
Two security vendors have released temporary fixes for a flaw in some Samsung Android phones that could allow an attacker to bypass a locked screen.
A group of U.S. lawmakers has introduced legislation that would require law enforcement agencies to get court-ordered search warrants before obtaining a suspect's mobile phone location or GPS data, instead of using prosecution-issued subpoenas.
Security researchers have uncovered yet another ongoing cyberespionage operation targeting political and human rights activists, government agencies, research organizations and industrial manufacturers primarily from Eastern European countries and fo...
Defense Distributed, the pro-gun nonprofit working to make 3D-printable gun designs freely available to everyone on the Internet, recently inched one step closer toward achieving that goal. The Austin, Texas-based group last week was granted a federa...
Former Tribune Company employee Matthew Keys has denied giving a username and password to anyone, or conspiring to cause damage to a protected computer.
Chinese cyberattacks targeting Taiwan are moving beyond stealing sensitive information, and could be capable of crippling the island's transportation and financial systems, a top security official claimed on Wednesday.
The website of a U.S. group focused on human rights in North Korea was hacked at the same time as a cyberattack on South Korean targets on Wednesday.
Security vendors analyzing the code used in the cyberattacks against South Korea are finding nasty components designed to wreck infected computers.
Gadgets & Things
Most Popular Reviews
- 1 Finally! LG OLED TV 2016 range review
- 2 Google Daydream View VR full, in-depth review
- 3 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
- 4 Apple iPhone 7 Plus review: including Portrait Mode
- 5 MSI GS70 laptop review
Join the PC World newsletter!
Latest News Articles
- Samsung still struggling with the recovery of Note7 phones from users
- Intel, Microsoft renew 'Wintel' partnership with Project Evo and VR specs for PCs
- New Windows 10 Insider Build allows you to shut down your PC with your voice
- Microsoft wants to enable cellular PCs, but will carriers bite?
- Microsoft-Qualcomm deal finally puts Windows 10 and Win32 apps on ARM devices
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- The top 10 best and worst tech gadgets and products of 2016
- TV of the year award 2016
- Best phone of the year 2016
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- TPSAP BO DeveloperWA
- FTLicensing SpecialistVIC
- TPTest LeadQLD
- CCPerformance Test AnalystQLD
- FTMarketing Automation DeveloperVIC
- CCSenior Business Analyst- System/ Solution DevelopmentNSW
- CCTest Lead : Perth BasedSA
- CCSolution Designer - MulesoftVIC
- CCHFC Quality Assurance Delivery Specialist | 6 Month ContractVIC
- CCEOI - TIBCO DeveloperWA
- FTSoftware DeveloperWA
- FTSenior .Net DeveloperVIC
- FTBusiness Analyst - SQLNSW
- CCService Desk Consultant - Must have baseline or NV1 clearanceNSW
- CCHadoop DeveloperQLD
- FTMiddleware Specialist / Systems AdministrationNSW
- FTSystem Engineer - VirtulisationNSW
- FTAndroid Technical Lead (Work From Home 2-3 Days)NSW
- FTStorage EngineerSA
- CCSecurity/Server EngineerNSW
- CCChange or Project Manager- Electrical Network EngineeringNSW
- CCOBIEE/ Oracle BI Analyst- Informatica & DACNSW
- FTSystem EngineerNSW
- FTOracle IDM R1/R2 Implementation SpecialistNSW
- CCProgram Business Change Director - HR PayrollNSW