World experts in computer science and mathematics spent an afternoon at the Heidelberg Laureate Forum in Germany trying to figure out how the widespread collection of data about consumers can be prevented from causing harm.
A closely watched band of suspected Russian hackers have spied on domestic targets, including two members of the outspoken punk rock band Pussy Riot.
AshleyMadison.com's owner said it is examining a large batch of data posted online by hackers who breached the website last month.
Gaming and hosting companies have been hit with a new kind of DDoS attack that could snowball without preventive steps, Level 3 Communications warned on Monday.
BitTorrent applications used by hundreds of millions of users around the world could be tricked into participating in distributed denial-of-service (DDoS) attacks, amplifying the malicious traffic generated by attackers by up to 50 times.
The cyberattack on U.S. taxpayer data reported by the Internal Revenue Service earlier this year now appears to be much worse than originally thought, the agency announced Monday, with as many as 300,000 citizens now believed to be potential victims.
An Italian teenager has found two zero-day vulnerabilities in Apple's OS X operating system that could be used to gain remote access to a computer.
A fresh analysis of documents disclosed by former U.S. intelligence contractor Edward Snowden shows that AT&T has been a much closer and eager partner for the National Security Agency's Internet spying activities than was previously known.
Mozilla wants to make private browsing truly private.
Responding to allegations from anonymous ex-employees, security firm Kaspersky Lab has denied planting misleading information in its public virus reports as a way to foil competitors.
An unpatched vulnerability in the Google Admin application for Android can allow rogue applications to steal credentials that could be used to access Google for Work acccounts.
Google has released another patch for the Stagefright vulnerability after a security firm said the first one didn't fix it.
Installing rogue firmware on embedded devices has long been a concern for security researchers, and it seems that such attacks have started to gain ground with hackers.
Security updates are being distributed for a telematics control unit (TCU) that security researchers showed could be manipulated to remotely apply the brakes of a Corvette, according to the device's French manufacturer.
Three “high risk” vulnerabilities in SAP Mobile could give attackers access to encrypted information stored in mobile devices, security firm Onapsis reported Wednesday.
Most Popular Reviews
- 1 Samsung Galaxy Note 7 review
- 2 Portable power: Venom Blackbook 13 Zero review
- 3 Alcatel Idol 4S review: King of the mid-range?
- 4 Witness a 241% Australian price hike: Dell Latitude 7370 review
- 5 Is this the best value phone on the market? Moto G4 Plus review
Join the PC World newsletter!
Latest News Articles
- Okta's API access product targets the trend toward services
- Say hello to old friend Dell Technologies on Sept. 7
- DARPA sees IoT and AI as weapons to dominate wars
- BitTorrent client is found distributing Mac-based malware
- Get started in data science: 5 steps you can take online for free
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCProject Manager XPLANNSW
- FTDB2 Database AdministratorVIC
- CCChange AnalystNSW
- CCDeployment CoordinatorNSW
- CCSenior Integration Specialist - IP NetworkVIC
- CCContract Junior Programmer (JAVA/J2EE/SQL) 160902/JP/709Asia
- FTSenior Full Stack .Net DeveloperNSW
- CCFacilities ManagerACT
- CCBusiness Analyst / SalesforceNSW
- CCFunctional & System Integration Test AnalystACT
- CCContract Analyst Programmer (JAVA/SQL) 160826/AP/972Asia
- CCICT Contracts ManagerSA
- CCMainframe Application ArchitectNSW
- CCDesktop Support AnalystNSW
- CCSr Project Manager - BASELINEACT
- CCContract Analyst Programmer (JAVA/Unix/Linux/Web) 160819/AP/173Asia
- FTClient Engagement ManagerVIC
- CCSolution Designer - Windows UpgradeNSW
- CCSr IT Support specialist - MCSE- L2/L3- Travelling requiredNSW
- CCContract Systems Analyst (.Net/SQL Server) 160829/SA/244Asia
- CCInfrastructure Deployment ManagerVIC
- CCPMO AnalystNSW
- FTBusiness Development Manager | ICT intelligent systems integrationVIC
- CCSenior IT Assistant (Office Automation/PC LAN) 160817/SITA/902Asia
- CCContract Systems Analyst (Datacentre Maintenance) 160817/SA/993Asia