European Union plans for new border controls will result in “big brother” surveillance a leading politician warned on Thursday.
Security researchers from antivirus vendor Sophos have uncovered a Tibet-themed attack campaign that abuses a legitimate and digitally signed Nvidia file to load malware on computers.
European privacy authorities approved a plan to come up with measures to curb Google's collection, combination and storage of its users' personal information before the summer.
General Dynamics is looking to bring U.S. government-level security to consumer smartphones, allowing organizations to benefit from the type of strong data protection only available on expensive and clunky mobile terminals.
Bank of America blamed a data breach on another company that revealed internal emails related to monitoring of hacktivist groups including Anonymous.
Despite the best efforts of cloud service providers and industry groups like the Cloud Security Alliance, cloud security remains a troublesome issue for IT execs.
Facebook is rolling out a patch to fix a rare bug in its API that had apparently been leaking users' phone numbers to app developers.
Security researchers have identified an ongoing cyber-espionage campaign that compromised 59 computers belonging to government organizations, research institutes, think tanks and private companies from 23 countries in the past 10 days.
A big theme at the RSA Conference this year is a concept known as Big Data Security -- the idea that massive amounts of data related to both network security and of business context should be stockpiled to be analyzed to pinpoint malware, rogue insid...
Dylan Wheeler, a computer security and gaming enthusiast who lives near Perth in Western Australia, could very well be in a lot of trouble.
Security company Maz Encryption Technologies sued seven large technology companies for allegedly infringing on several of its security patents. The suits target security technology used in the iPhone and iPad as well as the BlackBerry Enterprise Solu...
Researchers from security firm Symantec have found and analyzed a version of the Stuxnet cybersabotage malware that predates previously discovered versions by at least two years and used a different method of disrupting uranium enrichment processes a...
Researchers from two-factor authentication provider Duo Security found a loophole in Google's authentication system that allowed them to bypass the company's 2-step login verification by abusing the unique passwords used to connect individual applica...
Our roundup of new security products on hand at this week's show.
Bit9 said a common Web application vulnerability was responsible for allowing hackers to ironically use the security vendor's systems as a launch pad for attacks on other organizations.
Most Popular Reviews
- 1 Huawei P9 review: lifting photography to another level... sometimes.
- 2 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 3 D-Link Taipan AC3200 Ultra tri-band modem-router review
- 4 Dell XPS 13 (2016) review: Making the very best Ultrabook
- 5 Microsoft Surface Book review: The verdict on Microsoft's first notebook
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- Dell stops selling Android devices
- IBM and Cisco will make Watson into a virtual workmate
- Time is short to stop expansion of FBI hacking, senator says
- Over 100 DDoS botnets built using Linux malware for embedded devices
- HP sells PCs in a new way as it tries to speed up upgrades
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCContract System Analyst (Renewable Contract)Asia
- CCRuby on Rails DeveloperNSW
- CCSecurity Engineer - SUMO focusNSW
- CCProject ManagerNSW
- FTSenior Front End DeveloperNSW
- CCTechnology and Security ArchitectACT
- CCSenior IT Assistant (Office Automation/PC LAN) 160630/SITA/642Asia
- CCSharePoint DeveloperSA
- CCProgram Test ManagerNSW
- FTSolution ArchitectNSW
- CCBusiness Analyst, InsuranceNSW
- CCMicrosoft .NET Developer (Server and Applications)SA
- CCContract Analyst Programmer (J2EE/JAVA/SQL) 160621/AP/082Asia
- FTIT Project ManagerAsia
- CCProject Manager (Omni-Channel)VIC
- CCBusiness Impact AssessmentsVIC
- CCContract Systems Analyst (Linux/MySQL/Oracle) 160630/SA/254Asia
- CCSAP BASIS ConsultantVIC
- CCSharePoint Consultant - Office 365NSW
- FTDevelopment/Architect Capability ManagerVIC
- FTTechnical COE SpecialistACT
- CCProject Analyst/ CoordinatorVIC
- CCSystems Engineer | Defence intelligence projects | NV2 clearanceACT
- FTData Center Operator (1-Year Renewal Contract)Asia
- CCBiztalk developerNSW