Researchers from Security Explorations, a Poland-based vulnerability research firm, claim to have found two new vulnerabilities in Java 7 Update 11 that can be exploited to bypass the software's security sandbox and execute arbitrary code on computer...
Trend Micro has spotted a piece of malicious software that masquerades as the latest patch for Java, a typically opportunistic move by hackers.
A U.S. lawmaker has proposed legislation that would allow mobile phone users to ask apps to stop collecting their personal data and to delete information collected in the past.
The Shylock home banking malware has been updated with new functionality that allows it to spread automatically using the popular Skype Voice-over-IP (VoIP) and instant messaging client.
European Commission proposals for a strategy on cybercrime have come under fire before they have even been released.
Foxit released version 5.4.5 of its Foxit Reader PDF viewer plug-in on Thursday in order to address a critical remote code execution vulnerability that could have allowed attackers to compromise computers running previous versions of the software.
U.S. Attorney Carmen M. Ortiz said Wednesday that prosecutors recognized that there was no evidence against Internet activist Aaron Swartz that warranted severe punishment.
Microsoft vowed on Wednesday to improve two of its security products after both failed to pass an evaluation by a Germany security software testing organization.
Adobe released security patches for its ColdFusion application server on Tuesday, addressing four critical vulnerabilities that have been actively exploited by attackers since the beginning of January.
A Canadian think tank called on Tuesday for continued scrutiny of U.S. security vendor Blue Coat Systems after a new technical analysis showed wide use of its products in countries with human rights and censorship concerns.
Two U.S. power companies reported infections of malware during the past three months, with the bad software apparently brought in through tainted USB drives, according to the U.S. Department of Homeland Security's Industrial Control Systems Cyber Eme...
6Scan, a Web security startup based in Tel Aviv, Israel, launched a new service on Tuesday that can scan websites for security issues, like vulnerabilities and malware infections, and allows their owners to automatically fix the identified problems.
The hundreds of government, military and research organizations targeted in a large-scale cyberespionage operation dubbed Red October were not only attacked using malicious Excel and Word documents as previously believed, but also by using Web-based ...
Cryptocat, a project building an instant messaging platform that provides more privacy and security for activists, plans a host of improvements this year, including developing an application for mobile devices.
Unidentified attackers stole sensitive information from hundreds of diplomatic, government, research and military organizations from around the world as part of a newly uncovered cyberespionage campaign that started nearly six years ago. The operatio...
Most Popular Reviews
- 1 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 2 D-Link Taipan AC3200 Ultra tri-band modem-router review
- 3 Dell XPS 13 (2016) review: Making the very best Ultrabook
- 4 Microsoft Surface Book review: The verdict on Microsoft's first notebook
- 5 Telstra Wi-Fi 4GX Advanced III review: Testing the world's first 600Mbps wireless hotspot
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- Shared malware code links SWIFT-related breaches at banks and North Korean hackers
- Senate proposal to require encryption workarounds may be dead
- Acer's Windows 10 Switch hybrids priced to battle Chromebooks
- Seagate 8TB NAS drive: Review
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCSenior Change AnalystNSW
- CCAWS Developer/LeadNSW
- CCNetwork Architect VoiceNSW
- CCContract Analyst Programmer (J2EE/Oracle) 160520/AP/985Asia
- FTLinux System EngineersNSW
- CCPositive Vetted ICT positions - Defence intelligence and information securityACT
- CCInfrastructure Business AnalystNSW
- CCRelease Manager, SAPNSW
- FTSolution ArchitectACT
- CCSkilled Sitecore / .NET DeveloperNSW
- CCContract Programmer (MS SQL Server/SQL/Web) 160518/P/626Asia
- CCDeployment Engineer / IT AuditorQLD
- CCSenior IT Security Specialist-SANS, ISC2, ISACA, ITILNSW
- FTAgile CoachNSW
- CCSoftware Licensing AnalystVIC
- CCTechnical Digital Producer / Requirements EngineerNSW
- FTPega Operation Engineer - CEPNSW
- FTTester/Business AnalystWA
- CCInfrastructure Deployment ManagerVIC
- FTApplication Support EngineerVIC
- CCService Desk ConsultantACT
- FTNetwork EngineerNSW
- FTTechnical Team Lead - .Net / SharePointACT
- CCSenior Service Desk ManagerNSW
- CCSystems Engineer - Wintel, VMWare and CitrixNSW