The U.S. Federal Bureau of Investigation has arrested a Phoenix student, claiming that he is one of the LulzSec hackers responsible for a database attack on Sony Pictures computers that claimed more than 1 million victims.
When it comes to social engineering attacks, larger companies attract more of them, and when they are victimized it costs more per incident, according to a survey sponsored by Check Point.
As Netflix commits its future to streaming movies to customers, it relies almost exclusively on cloud services for its infrastructure, raising security concerns that require a new way of thinking, the company's cloud security architect says.
With the proliferation of data breaches, The Harford insurance company is selling a new data loss insurance aimed at small businesses that might be put at financial risk if they lose valuable and sensitive data.
Adobe on Wednesday patched six vulnerabilities in Flash Player, including one it admitted is already being exploited by attackers.
The latest social engineering trick to get victims to open malicious email attachments accuses them of being spammers and threatens to sue them if they don't stop.
The Dutch company that was hacked earlier this summer by certificate thieves has gone bust and shut down, its U.S.-based owner said Tuesday.
Japan's biggest defense contractor Mitsubishi Heavy has admitted that it was targeted by a major cyberattack last month in which at least 83 of its computers were infected with malware.
There's big trouble in the world of information security, and yet it seems that only a handful of us techies have noticed. What's the problem, you ask? Well, there are actually several problems, but they're all related to one very important issue: pu...
In November 2009 the European Parliament approved a directive on Internet privacy that, among other things, required user opt-in before websites could install cookies on the user's computer.
The theft of SSL certificates from Dutch certificate authority DigiNotar so undermined trust in the company that it has gone bankrupt.
A Chinese government official today denied any involvement in the attack that compromised scores of servers belonging to Mitsubishi Heavy Industries, Japan's largest defense contractor.
Two prominent Chinese hackers have released a convention calling for the rejection of cybertheft and are asking their peers to support it, as China is increasingly seen as the source of international hacking attacks.
A California man who dug up sensitive information belonging to U.S. service members on peer-to-peer networks, and then used it to order iPods, cameras, and even washing machines from an online store, was sentenced to 75 months in federal prison Thurs...
The PCI Security Standards Council today is expected to issue guidelines on use of point-to-point encryption in protecting sensitive payment card data, but the narrow approach — which is focused on hardware — is raising questions.
Most Popular Reviews
- 1 Apple MacBook (early 2015) review: Almost a game changer
- 2 Microsoft Surface 3 Windows 8.1 tablet
- 3 HP Spectre x360 convertible laptop
- 4 Intel NUC Kit (NUC5i5RYH) Mini PC
- 5 Dell XPS 13 laptop (early 2015 model)
Join the PC World newsletter!
Best Deals on GoodGearGuide
Latest News Articles
- US Senate blocks NSA surveillance reform bill
- Amazon rules Gartner's magical box
- Google gives Android developers new tools for tracking app performance
- US Senate leader pushes to extend NSA phone dragnet
- Pebble Time smartwatch to begin shipping on May 27
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTSenior Digital B2B Sales Manager | Household BrandNSW
- CCMobile Designer / Developer - IOSNSW
- FTKey Account ManagerNSW
- FTApplication Security SpecialistNSW
- FTSENIOR FORMS ANALYST (13767)QLD
- FTSenior Sales Executive X 3 World Leading Music Streaming PlatformNSW
- FTSMB Direct Sales Account Executive | Largest Global Online MarketplaceNSW
- CCMobile Designer / Developer - IOSNSW
- FTSenior SQL DBANSW