Italian surveillance software maker Hacking Team recently claimed that it hasn't lost any customers after the massive leak of its internal data two weeks ago. But it has lost at least one business partner: U.S.-based penetration testing specialist an...
Surveillance software maker Hacking Team has provided its government customers with the ability to infect the low-level firmware found in laptops and other computers that they wanted to spy on.
The group behind the Duqu cyberespionage tool has compromised at least two telecommunications operators and one electronic equipment manufacturer, in addition to a cybersecurity firm and venues that hosted high-level nuclear negotiations between worl...
Multiple cyberespionage groups are specifically targeting government and military organizations from countries in Asia and the Pacific region with the goal of gathering geo-political intelligence, according to new security research.
A security firm is warning that a group of Russian hackers known for targeting military, government and media organizations is now preparing to attack banks in the US and elsewhere.
A team of developers has created a rootkit for Linux systems that uses the processing power and memory of graphics cards instead of CPUs in order to remain hidden.
The group of attackers behind cyberintrusions at the White House and the Department of State last year used malware that bears strong similarities to cyberespionage tools suspected to be of Russian origin.
Even though its activities were exposed last year, a cyberespionage group dubbed Pawn Storm has ramped up its efforts over the past few months, targeting NATO members and potentially the White House.
Based on data collected by Google, less than one percent of Android devices had a potentially harmful application installed last year. This includes devices on which users have installed applications from outside the official Google Play store.
A new malware program is being used to do reconnaissance for targeted attacks against companies in the energy sector.
For the past two years, a cyberespionage group that likely operates from Lebanon has hacked into hundreds of defense contractors, telecommunications operators, media groups and educational organizations from at least 10 countries.
As security researchers continue to analyze malware used by a sophisticated espionage group dubbed the Equation, more clues surface that point to the U.S. National Security Agency being behind it.
If you patched your Windows computers in 2010 against the LNK exploit used by Stuxnet and thought you were safe, researchers from Hewlett-Packard have some bad news for you: Microsoft's fix was flawed.
A collection of computer Trojans that have been used since 2009 to steal data from government agencies, military contractors, media organizations and other companies is tied to cyberespionage malware possibly created by French intelligence agencies.
European law enforcement agencies seized command-and-control servers used by Ramnit, a malware program that steals online banking credentials, FTP passwords, session cookies and personal files from victims.
Most Popular Reviews
- 1 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 2 D-Link Taipan AC3200 Ultra tri-band modem-router review
- 3 BlackBerry Priv review: When old habits die hard
- 4 Dell XPS 13 (2016) review: Making the very best Ultrabook
- 5 Microsoft Surface Book review: The verdict on Microsoft's first notebook
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- Stock-market jitters have rocked network spending, Cisco says
- Android root malware widespread in third-party app stores
- UCLA just open-sourced a powerful new image-detection algorithm
- Microsoft lets cautious users try more of Windows 10’s leading edge
- A new IoT gateway design could be Bluetooth's ticket to the cloud
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTDigital Marketing Specialist | Media BuyerNSW
- FTLevel 2 IT Support TechnicianVIC
- CCRecords Officer - CanberraACT
- FTLinux AdministratorVIC
- FTNetwork EngineerSA
- CCSenior Business Analyst - IT SecurityNSW
- CCContract Analyst Programmer (JAVA/Oracle/UNIX) 160203/AP/381Asia
- FTPrincipal Business Analyst (SQL/SAS)NSW
- CCSenior Business Analyst - BaselineACT
- CCBusiness AnalystNSW
- FTBusiness Analyst - Superannuation FundVIC
- FTSenior Consultant | Project work | National Systems IntegratorNSW
- CCSenior Business Analyst, Enterprise Software SolutionNSW
- CC.NET DeveloperACT
- CCHigh Level Network Engineer (Communications)WA
- CCICT Infrastructure Specialist - (Network Engineer)ACT
- CCJava Development Contract - MelbourneVIC
- CCTechnical Tester - AutomationVIC
- CCSAP Basis Admin with JavaACT
- CCData AnalystNSW
- CCImplementation ManagerVIC
- FTInsight / Customer - Data ScientistNSW
- CCBusiness AnalystACT
- CCData Stage DeveloperNSW
- CCContract System Analyst (MSSQL/.Net/Mobile App) 160122/SA/vhaAsia