A former Tribune Company employee could face as much as 10 years of jail time over federal charges accusing him of conspiring with members of the hacker group Anonymous to hack into a Tribune website.
Enterprises that use mobile device management (MDM) systems to protect their corporate data on employees' mobile phones are not safe from attacks from spyphones, researchers warned at BlackHat Europe on Thursday.
A U.S. government computer vulnerability database and several other websites at the National Institute of Standards and Technology have been down for nearly a week after workers there found malware on two Web servers.
New recommendations from Europe's top privacy watchdog could have big ramifications for Google Play, Apple and application developers.
Two researchers from security firm Imperva have devised new techniques that could allow attackers to extract sensitive information from users' encrypted Web traffic.
New research suggests a controversial spyware suite called FinFisher is being used to track activists in more countries than previously thought, including Vietnam and Ethiopia.
Since the start of the year, hackers have been exploiting vulnerabilities in Java to carry out a string of attacks against companies including Microsoft, Apple, Facebook and Twitter, as well as home users. Oracle has made an effort to respond faster ...
Google has launched a site for webmasters whose sites have been hacked, something that the company says happens thousands of times every day.
If you're not sure about the purpose behind Daiyuu Nobori's online thesis project, perhaps the large picture of the collapse of the Berlin Wall will help.
Microsoft will release security updates for applications in its Windows Store as those patches are available in order to speed up the updating process.
A website that provides US consumers with a free annual credit report appears to have been the source used by hackers to download those of celebrities including Beyoncé and government officials including Federal Bureau of Investigation Director Rober...
As part of its monthly issue of software patches, Microsoft has fixed a Windows vulnerability that would have allowed someone to subvert a computer's security using only a USB thumb drive and some attack code.
Cyberattacks are near the top of the list of most serious threats facing the U.S., with the rivaling concerns about terrorism and North Korea, intelligence officials with President Barack Obama's administration said.
A top U.S. official called on China to investigate and stop cyberattacks, which he said pose a growing threat to the countries' economic relationship.
Reporters Without Borders named five countries that regularly spy on journalists and dissidents, a practice the group contends is made possible with advanced technology from private companies.
Most Popular Reviews
- 1 Sony Xperia X Performance review: Sony’s most disappointing product in years
- 2 Huawei P9 review: lifting photography to another level... sometimes.
- 3 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 4 D-Link Taipan AC3200 Ultra tri-band modem-router review
- 5 Dell XPS 13 (2016) review: Making the very best Ultrabook
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- These solar road panels could turn our world into Tron
- New Satana ransomware encrypts user files and master boot record
- Firmware exploit can defeat new Windows security features on Lenovo ThinkPads
- Use Apache Spark? This tool can help you tap machine learning
- Intel tunes its mega-chip for machine learning
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTBusiness AnalystNSW
- FTContinuous delivery application deployment automation specialist (DevOps)NSW
- FTBusiness Analyst - Clinical SystemsSA
- FTInformation Security ConsultantACT
- CCAnalyst Programmer (J2EE/ SQL*PLUS/PL/SQL/PRO*C) 160617/AP/983Asia
- FTIT Senior Business Analyst (12M)NSW
- FTIT Project Coordinator- Data Center Infrastructure backgroundNSW
- FTSenior Network Engineer JUNIPERNSW
- CCx2 AEM Frontend/UI DevelopersVIC
- CCProject Scheduler - IT Security ProgramNSW
- FTSenior Manager Practice LeadNSW
- CCSystems Trainer - Networking/ RadioVIC
- FTSenior Front End DeveloperNSW
- CCProject ManagerNSW
- CCSenior Change Manager, Financial ServicesNSW
- CCContract Programmer (IT Security/Website Admin) 160617/P/564Asia
- CCIT Business AnalystNSW
- CCBusiness Analyst - BPRNSW
- CCSystems Engineer / Applications Scripting DeveloperSA
- CCContract IT Assistant (IT Security/IT Audit) 160621/ITA/361Asia
- CCTenable Security - Technical ConsultantVIC
- FTTechnical/Solutions ArchitectNSW
- CCUX DesignersQLD
- FTTechnical Business Analyst (Integration background)NSW
- CCSenior Media AnalystVIC