One-time passcodes, a crucial defense for online banking applications, are being intercepted by a malware program for Android, according to new research from Symantec.
A major cyberattack next year will target a U.S. election, security expert Bruce Schneier predicts.
Google researchers found a software flaw in several models of FireEye's security appliances which they say could give a cyberattacker full access to a company's network.
The open-source project behind the widely used Joomla content management system has issued a patch for a vulnerability that is now being widely used by hackers.
The number of DDoS attacks increased by 180 percent during the third quarter of this year compared to the same period in 2014.
The Commonwealth Bank and the University of New South Wales have announced a $1.6m, five-year partnership to develop a centre of expertise for cyber security education aimed at boosting the nation’s reserve of quality security engineering profession...
Hackers based in Iran have been using malware to spy on individuals, including potentially dissidents and activists in the country, according to new research from Symantec.
FireEye says it has discovered a type of malware designed to steal payment card data that can be very difficult to detect and remove.
Users who have Dell Windows-based laptops, desktops, tablets and other devices that were bought before August should check if their systems have the self-signed eDellRoot certificate that can compromise their private communications.
SentinelOne has added a feature to its endpoint detection products that can restore files encrypted by cybercriminals, a common type of attack known as ransomware.
Cisco is working to build the confidence of prospective customers in its products, two years after the NSA spying disclosures seeded doubt, particularly in China.
Microsoft combines the attack protection, detection and response features built into Windows 10, Office 365, Azure and the Microsoft Enterprise Mobility Suite to help enterprises improve their operational security posture.
Security researchers say a second experiment showing how easy it is to write ransomware for Apple Macs isn't surprising, so it's likely that hackers will eventually target Apple computers with it.
Adobe Systems' Flash plugin gets no love from anyone in the security field these days. A new study released Monday shows just how much Flash is favored by cybercriminals to sneak their malware onto computers.
IBM may be the fastest-growing vendor in the worldwide security software market, but it's also the owner of the world's largest source of spam.
Most Popular Reviews
- 1 Hisense Series 7 ULED 4K UHD TV review
- 2 Samsung Galaxy Note 7 review
- 3 Portable power: Venom Blackbook 13 Zero review
- 4 Alcatel Idol 4S review: King of the mid-range?
- 5 Samsung Galaxy S7 Edge Review
Join the PC World newsletter!
Latest News Articles
- Swift CEO reveals three more failed attacks on banking network
- Microsoft Azure networking is speeding up, thanks to custom hardware
- Google rolls out more low-bandwidth versions of its products
- Halt WhatsApp data transfers, German privacy watchdog tells Facebook
- Alleged YouTube music ripper sued by industry for copyright infringement
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTAndroid DeveloperNSW
- CCDesktop Infrastructure SpecialistACT
- CCInfrastructure Project Manager - DCR ProjectNSW
- CCData Analyst | Data Feeds | Catalogue and MapNSW
- CCSolution ArchitectQLD
- FTOutbound TelesalesVIC
- FTInfrastructure Solutions ArchitectACT
- CCLAN ConsultantWA
- FTCarrier/ Industrial Network ConsultantsWA
- CCContract Systems Analyst (IT Security) 160928/JP/653Asia
- CCBI Reporting AnalystACT
- CCPMO AnalystNSW
- FTBusiness Development Manager | ICT intelligent systems integrationVIC
- CCNetwork Design Specialist - TelecommunicationsNSW
- CCContract Junior Programmer (J2EE/SQL) 160927/JP/551Asia
- FTCertification and Accreditation Security ConsultantACT
- CCJava / J2ee ProgrammersACT
- CCTechnical Architect/DesignerACT
- CCSecurity Cleared IT Professionals - Expression of InterestSA
- FTIT Pre-Sales EngineerSA
- FTJava DeveloperNSW
- FTDesktop/Application SupportVIC
- CCWAN Architect and ConsultantWA
- FTPositive Vetted ICT positions - Defence intelligence and information securityACT
- CCSenior Business Analyst -Change and SAP ProcurementNSW