Dell can trump Cisco in the information-technology security market, say Dell's executives in describing how the company with its multifaceted approach will hold an edge against some powerful rivals that also include HP and IBM.
The European Parliament's industry committee approved more than 900 amendments to proposed new data protection laws.
Oracle released new Java security updates on Tuesday and announced plans to accelerate the release of future Java patches following recent attacks that have infected computers with malware by exploiting zero-day vulnerabilities in Java browser plug-i...
China's Ministry of National Defense on Wednesday refuted the accusations that the nation's military supports cyberespionage, and said a recent security report backing the claims used scientifically flawed evidence.
Twitter is urging its account holders to be smarter with their passwords following two recent attacks by hackers directed at Burger King and Jeep that took control of those accounts.
Mozilla is taking steps to limit the risk of powerful subordinate Certificate Authority (CA) certificates falling into the hands of attackers and potentially being used to issue rogue certificates for use in SSL snooping attacks.
Apple has been the victim of a malware attack. A small number of systems inside the company were compromised.
Tesco has confirmed that it has called in the police to investigate a possible data breach after a number of complaints from Clubcard members who claim to have had their online accounts compromised.
A new report traces a large cybersecurity threat group to China's People's Liberation Army, specifically an unit that goes under the cover name "Unit 61398".
Burger King saw a surprising upside after its Twitter account was compromised on Monday: tens of thousands of people began following its account.
UK PLC is in desperate need of a new money transmission system that does a better job of handling the plethora of digital payment methods that are in use today.
European privacy authorities have threatened action before the Summer to curb Google's collection, combination and storage of its users' personal information, after growing impatient with the company's failure to respond to their criticisms of its re...
13 myths about information-technology security you’ll hear but should you believe?
Adobe Systems said it will release patches for two critical vulnerabilities disclosed last week that are actively being used by attackers.
Advanced Persistent Threats (APTs) could be more of a mainstream security problem than previously thought after a survey of high-level security professionals found that an alarming one in five worked for a firm that had experienced such an attack.
Most Popular Reviews
- 1 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
- 2 Sony Xperia XZ review: turbo-charged last-gen phone
- 3 Sony X9300D and X8500D UHD 4K TV review
- 4 Hisense Series 7 ULED 4K UHD TV review
- 5 Moto X Force review: Leading features from a mid-range phone
Join the PC World newsletter!
Latest News Articles
- Intel asserts its trademark rights against John McAfee
- Big data: The obstacles we’re seeing and how to overcome them
- Privacy groups target kids advertising disguised as YouTube content
- Ex-NSA contractor hoarded two decades' worth of secrets
- Cloud growth continues to be the name of the game for Microsoft
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- Google Pixel XL full, in-depth smartphone review: The new best Android phone
- Japan Robot, gadget and car expo slideshow
- Panasonic DX900U UHD 4K smart TV review: Best all-round TV ever?
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- CCIT Risk ManagerNSW
- CCFront End DeveloperNSW
- CCInformation Security Consultant - RSA ArcherNSW
- CCInfrastructure ArchitectNSW
- FTProject Manager - Intelligent Transport SolutionsNSW
- CCJava DeveloperNSW
- CCProject AnalystVIC
- CCSenior Business Analyst, Margin ProjectsNSW
- CCData Centre EngineerNSW
- CCCommunications ManagerVIC
- CCContract Analyst Programmer (HTML/JAVA/J2EE) 161025/AP/862Asia
- CCContract Analyst Programmer (CISCO/IT Security) 161028/AP/142Asia
- FTMobile DeveloperAsia
- CCSenior Business AnalystVIC
- CCJunior Programmer (Application Dev. & Mgt.) 161017/JP/221Asia
- CCContract Analyst Programmer (Web Programming) 161013/AP/185Asia
- FTBiomedical Project ManagerSA
- CCCloud Security Services SpecialistVIC
- CCPerformance AnalystNSW
- FTLevel 2 Service Desk AnalystVIC
- CCContract IT Assistant (System Backup Operation) 161014/ITA/523Asia
- CCContract Systems Analyst (IT Security/Admin.) 161014/SA/253Asia
- CCContract IT Assistant (Office Automation) 161031/ITA/541Asia
- CCSAP FunctionalistACT