6Scan, a Web security startup based in Tel Aviv, Israel, launched a new service on Tuesday that can scan websites for security issues, like vulnerabilities and malware infections, and allows their owners to automatically fix the identified problems.
The hundreds of government, military and research organizations targeted in a large-scale cyberespionage operation dubbed Red October were not only attacked using malicious Excel and Word documents as previously believed, but also by using Web-based ...
Cryptocat, a project building an instant messaging platform that provides more privacy and security for activists, plans a host of improvements this year, including developing an application for mobile devices.
Unidentified attackers stole sensitive information from hundreds of diplomatic, government, research and military organizations from around the world as part of a newly uncovered cyberespionage campaign that started nearly six years ago. The operatio...
The Massachusetts Institute of Technology is conducting an inquiry into its role in the legal struggles that are believed to have lead to the suicide Friday of Internet activist Aaron Swartz.
Microsoft will release a patch on Monday for older versions of its Internet Explorer browser, deviating from its normal repair schedule due to the seriousness of the problem.
Oracle released two out-of-band patches on Sunday for vulnerabilities in its Java programming language, both of which pose a high risk to users browsing the web.
Internet users should consider disabling Java in their browsers because of an exploit that can allow remote attackers to execute code on a vulnerable system, the U.S. Computer Emergency Readiness Team (US-CERT) recommended late Thursday.
Oracle is preparing to ship 86 patches covering security vulnerabilities in a wide span of its products, with 18 of the fixes aimed at the MySQL database alone.
Mobile application developers should minimize privacy surprises for their customers by limiting their data collection and retention and giving users access to the data collected, California Attorney General Kamala Harris has recommended.
An exploit for a previously unknown and currently unpatched vulnerability in Java is being used by cybercriminals to infect computers with malware, according to security researchers.
Foxit Reader, a PDF viewer application often used as an alternative to the more popular Adobe Reader, contains a critical vulnerability in its browser plug-in component that can be exploited by attackers to execute arbitrary code on computers.
SecurEnvoy and PasswordBank have joined forces to allow users to access multiple cloud services at the same time using their mobile phones.
Security researchers say a patch released by Yahoo earlier this week for a serious email vulnerability did not fix the problem, leaving users at risk.
Most Popular Reviews
- 1 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 2 BlackBerry Priv review: When old habits die hard
- 3 Dell XPS 13 (2016) review: Making the very best Ultrabook
- 4 Microsoft Surface Book review: The verdict on Microsoft's first notebook
- 5 Google Nexus 6P review: An outstanding multimedia machine
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- Telstra's mobile network goes down across the country
- Microsoft's Azure Stack beta gets new services and DevOps tools
- Prysm combines displays with SaaS to extend the reach of enterprise collaboration
- Forget Trump and Clinton: IBM's Watson is running for president
- 5G might be your next home broadband service
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCProject Server Specialist / MS ProjectNSW
- CCSystems AnalystQLD
- FTSenior Unified Communications Consultant - National IT ServicesNSW
- FTLinux AdministratorVIC
- FTSecurity ArchitectWA
- FTHelpdesk support - Level 1VIC
- CCProgram Support ManagerQLD
- CCSenior Business AnalystNSW
- CCProject CoordinatorNSW
- CCService ModellerNSW
- FTApplication Packaging & Deployments Team LeaderNSW
- CCMid-level DevOps EngineerNSW
- FTAndroid DeveloperNSW
- FTInsight / Customer / modelling - Analyst (Data Scientist)NSW
- CCSharepoint AdministratorVIC
- CCPython Web Developer - DevOPS EnvironmentVIC
- CCIBM ESB Developer (Junior to mid level role)NSW
- FTIT Technical LeadVIC
- FT.NET Tech LeadVIC
- CCObjective ECMS Technical ConsultantSA
- CCJava DeveloperVIC
- CCChange LeadNSW
- CCProject ManagerSA
- FTNetwork Systems LeadVIC
- CCSSIS/ SSRS ExpertVIC