The number of DDoS attacks increased by 180 percent during the third quarter of this year compared to the same period in 2014.
The Commonwealth Bank and the University of New South Wales have announced a $1.6m, five-year partnership to develop a centre of expertise for cyber security education aimed at boosting the nation’s reserve of quality security engineering profession...
Hackers based in Iran have been using malware to spy on individuals, including potentially dissidents and activists in the country, according to new research from Symantec.
FireEye says it has discovered a type of malware designed to steal payment card data that can be very difficult to detect and remove.
Users who have Dell Windows-based laptops, desktops, tablets and other devices that were bought before August should check if their systems have the self-signed eDellRoot certificate that can compromise their private communications.
SentinelOne has added a feature to its endpoint detection products that can restore files encrypted by cybercriminals, a common type of attack known as ransomware.
Cisco is working to build the confidence of prospective customers in its products, two years after the NSA spying disclosures seeded doubt, particularly in China.
Microsoft combines the attack protection, detection and response features built into Windows 10, Office 365, Azure and the Microsoft Enterprise Mobility Suite to help enterprises improve their operational security posture.
Security researchers say a second experiment showing how easy it is to write ransomware for Apple Macs isn't surprising, so it's likely that hackers will eventually target Apple computers with it.
Adobe Systems' Flash plugin gets no love from anyone in the security field these days. A new study released Monday shows just how much Flash is favored by cybercriminals to sneak their malware onto computers.
IBM may be the fastest-growing vendor in the worldwide security software market, but it's also the owner of the world's largest source of spam.
Google and Yahoo are expanding their use of a successful system used to detect spam.
Thousands of medical devices, including MRI scanners, x-ray machines and drug infusion pumps, are vulnerable to hacking, creating significant health risks for patients, security researchers said this week.
Cisco is tying with a Chinese partner for joint development and better access to the local market, according to a newspaper report.
Microsoft has acquired security company, Adallom, in a bid to give IT departments more control over application access as well as data stored across cloud services.
Gadgets & Things
Most Popular Reviews
- 1 Finally! LG OLED TV 2016 range review
- 2 Google Daydream View VR full, in-depth review
- 3 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
- 4 Apple iPhone 7 Plus review: including Portrait Mode
- 5 MSI GS70 laptop review
Join the PC World newsletter!
Latest News Articles
- Intel, Microsoft going long distance with Cortana on Windows 10 PCs
- Obama orders review of election hacks as Trump doubts Russia's role
- Ransomware attacks against businesses increased threefold in 2016
- Attackers use hacked home routers to hit Russia's 5 largest banks
- US mulls rules for airlines that plan in-flight Wi-Fi voice calls
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- The top 10 best and worst tech gadgets and products of 2016
- TV of the year award 2016
- Best phone of the year 2016
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- CCAPI DeveloperQLD
- FTRF EngineerNSW
- CCApplication Specialist (Cerner) - Brisbane BasedNSW
- CCChange AnalystNSW
- CCSolution Designer and DeveloperNSW
- FTIT EngineerNSW
- CCChange & Release AdministratorNSW
- CCChange Manager (Office365) required for leading digital innovator in SydneyNSW
- TPSharepoint 2013 AnalystQLD
- TPFrontend DeveloperNSW
- CCInfrastructure Project ManagerNSW
- CCBusiness Analyst - BI, DataNSW
- CCDevelopment Lead - JavaNSW
- CCERP LeadWA
- CCElectronic Medications Management Solution ArchitectQLD
- CCProcess Analysts, Wealth ManagementNSW
- CCProject Management - Infrastructure projectsVIC
- FTIdentity Management Team LeaderQLD
- CCIteration Manager / Scrum MasterVIC
- FTProject Manager - Security Operations CentreVIC
- TPService Desk AnalystVIC
- FTFront End DeveloperVIC
- FTProduct Manager - TV and MediaVIC
- CCSenior Business AnalystACT
- CCData ScientistNSW