Project Blitzkrieg, a coordinated attack against U.S. banking customers allegedly planned for the spring of 2013, is a real and credible threat, security researchers at McAfee have said.
European lawmakers want to stop exports of technology that can censor information to repressive regimes.
Microsoft has launched a new anti-piracy campaign in China, which intends to highlight the security risks of buying counterfeit software.
Japanese police are looking for an individual who can code in C#, uses a "Syberian Post Office" to make anonymous posts online, and knows how to surf the web without leaving any digital tracks -- and they're willing to pay.
Some advertising analytics companies are using a vulnerability in Microsoft's Internet Explorer browser for a questionable edge in figuring out if web users are actually seeing display advertisements buried within web pages.
Google has changed the way it handles image searches so that pornographic pictures are less likely to be presented to those who aren't looking for them.
Oracle is simplifying its security offerings by combining a pair of existing tools into a single package.
Adobe released security updates for its Flash Player and ColdFusion products on Tuesday in order to address critical vulnerabilities that could give attackers control over the affected computers.
U.S. law enforcement agencies with the help of Facebook have arrested 10 persons from various countries in connection with international cybercrime rings that targeted users on the social network.
A marketplace where security researchers can sell details on software bugs said it was compromised on Tuesday due to an "embarrassing oversight" that left its web server vulnerable.
If you're watching TV and the channel suddenly changes, you may not have sat on the remote control by accident.
In-Q-Tel, the technology investment arm of the U.S. Central Intelligence Agency (CIA), will invest in Tyfone, a small developer of mobile banking, identity management and near-field communication systems.
Romanian authorities dismantled a cybercriminal ring that stole an estimated US$4 million from U.S. citizens by posting offers for non-existent items on online auction websites.
Bromium has upgraded its security platform vSentry, which uses virtualization to isolate malicious code, to protect virtual desktops and old Windows XP PCs.
Researchers from Israel-based IT security firm Seculert have uncovered a custom-made piece of malware that infected hundreds of point-of-sale (PoS) systems from businesses in 40 countries in the past few months and stole the data of tens of thousands...
Gadgets & Things
Most Popular Reviews
- 1 Finally! LG OLED TV 2016 range review
- 2 Google Daydream View VR full, in-depth review
- 3 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
- 4 Apple iPhone 7 Plus review: including Portrait Mode
- 5 MSI GS70 laptop review
Join the PC World newsletter!
Latest News Articles
- US mulls rules for airlines that plan in-flight Wi-Fi voice calls
- Georgia says it's traced an attempted voter hack to DHS
- How the Internet of Things is putting us at risk
- AMD packs more horsepower into GPUs with new Radeon ReLive software
- Cortana for iOS, Android now features quick access to common actions
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- The top 10 best and worst tech gadgets and products of 2016
- TV of the year award 2016
- Best phone of the year 2016
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- CCFunctional Consultant - Brisbane locationOther
- CCJAVA Developer- XML, SOAP, GIS, Web services, SPRINGNSW
- TPChange ManagerQLD
- FTTechnical Customer SupportQLD
- CCSenior Front End DeveloperSA
- CCTest Lead : Perth BasedVIC
- CCWindows Systems Engineer - AD, VMware, RedHat experienceNSW
- FTUI DeveloperVIC
- CCFacilities Coordinator/ Data Centre Coordinator- Multiple RolesVIC
- CCProject CoordinatorNSW
- FTTSM SpecialistNSW
- CCSolution Architect-PHPNSW
- FTDigital Delivery and Engagement OfficersVIC
- CCSAP HR Functional ConsultantQLD
- FTPractice AdvisorNSW
- CCLotus Notes DeveloperNSW
- FTService Delivery Management LeadQLD
- FTProject Manager - ProcurementSA
- CCSenior UX/UI DesignerNSW
- CCCloud Automation Engineer. Work Location - CanberraNSW
- CCService Desk AnalystNSW
- TPAEM Developer (frontend)NSW
- FTSenior Security and Risk ConsultantNSW
- CCProgram Manager BankingNSW
- FTIndustry Engagement ManagerVIC