The Electronic Frontier Foundation (EFF) doesn't think that the digital advertising industry can efficiently regulate itself and has issued a statement saying that the self-regulatory principles for multisite data recently published by the Digital Ad...
Apple's iTunes 10.5.1 update addresses a weakness in the application's update mechanism that could be exploited to trick users into visiting malicious websites.
The computerized records system at Santa Clara University in California was compromised to alter student grades, an official of the university said.
Huawei Technologies will buy out the rest of a joint venture with Symantec for US$530 million, the companies announced on Monday.
Smartphones and tablets are evolving from niche luxury devices to mainstream consumer gadgets. As mobile devices become a ubiquitous part of the mainstream culture, malware developers are paying attention and are anxious to exploit the fertile new te...
Regulators are starting to investigate what kind of oversight is in place to make sure that mobile applications don't encroach on user privacy rights, a lawyer in Microsoft's Windows Phone segment said on Monday.
Researchers from security vendor F-Secure have spotted a rare malicious software sample that carried a valid code-signing certificate from a Malaysian governmental institution.
The restrictions imposed by Mac OS X generic application sandbox profiles can be easily bypassed, researchers from Core Security Technologies found.
For all of the concern around Duqu, the most discussed piece of malicious software since Stuxnet, the latest analysis of its code shows its writers have a sense of humor.
The Hamburg Data Protection Authority (DPA) is starting preliminary procedures to bring legal action against Facebook over the facial recognition feature used for photo tagging on the social network. The authority decided that further negotiation is ...
The European Commission is preparing a major reform of the E.U. Data Protection Directive, which will focus on how foreign companies handle European consumer data.
The lab credited with discovering the Duqu malware has built an open-source toolkit that administrators can use to see whether their networks are infected.
Researchers from security vendor Trusteer have come across a professional calling service that caters to cybercriminals. The business offers to extract sensitive information needed for bank fraud and identity theft from individuals.
The Italian company criticized for supplying the brutal Syrian regime with telecommunications surveillance equipment has frozen participation in the project and is seeking a way to extricate itself from the contract, Area SpA CEO Andrea Formenti said...
Most Popular Reviews
- 1 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
- 2 Sony Xperia XZ review: turbo-charged last-gen phone
- 3 Hisense Series 7 ULED 4K UHD TV review
- 4 Sony X9300D and X8500D UHD 4K TV review
- 5 Moto X Force review: Leading features from a mid-range phone
Join the PC World newsletter!
Latest News Articles
- Pennsylvania man sentenced to 18 months for celeb hacking
- Personal data of 550,000 Red Cross blood donors was breached
- Yet another Apple dongle: Apple Thunderbolt 3 (USB-C) to Thunderbolt 2 Adapter now available
- Meet Apple’s complete MacBook lineup
- 7 technologies killed in Apple's new MacBook Pro
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- Google Pixel XL full, in-depth smartphone review: The new best Android phone
- Japan Robot, gadget and car expo slideshow
- Panasonic DX900U UHD 4K smart TV review: Best all-round TV ever?
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- CCPentaho BI DeveloperQLD
- CCSenior Business Analyst - Telco - Melbourne CBDVIC
- FTData AnalystNSW
- CCSharePoint / Office365 DeveloperVIC
- CCSystems Engineer - NetApp, Exchange, ADNSW
- TPBusiness Analyst/Data Analytics ConsultantVIC
- CCBusiness AnalystNSW
- CCContract Analyst Programmer (J2EE/Oracle) 161031/AP/512Asia
- CCSAP Release & Deployment ManagerNSW
- CCTest Engineer - .NETNSW
- CCNetwork DesignerVIC
- FTBusiness AnalystVIC
- CCAX Functional SupportQLD
- CCApplication Support DeveloperVIC
- FTUI UX Specialist | Technical BAQLD
- FTMicrosoft Dynamics AX Finance ConsultantVIC
- FTBusiness Analyst - Health Industry - Melbourne CBDVIC
- CCSenior Front End DeveloperVIC
- FTTechnical Business AnalystQLD
- CCJava Developers - Federal Government experienceNSW
- TPSenior Analyst|Progress ProgrammerQLD
- FTPega DeveloperVIC
- CCIT Manager - ANZNSW
- FTSenior UX DesignerAsia
- CCProject SchedulerACT