The Stuxnet computer worm that was used to sabotage the Iranian nuclear program was likely preceded by another sophisticated malware program that used some of the same exploits and spread through USB thumb drives to computers isolated from the Intern...
Keylogging malware that may have been used by the NSA shares signficant portions of code with a component of Regin, a sophisticated platform that has been used to spy on businesses, government institutions and private individuals for years.
In addition to having its own arsenal of digital weapons, the U.S. National Security Agency reportedly hijacks and repurposes third-party malware.
A sophisticated group of cybercriminals has stolen over US$25 million by hacking into the infrastructure of numerous financial institutions in Russia and former Soviet Union countries, as well as into point-of-sale systems belonging to U.S. and Europ...
A new computer Trojan based on the infamous ZeuS banking malware is targeting users of over 150 banks and payment systems from around the world, security researchers warn.
A newly discovered malware program designed to infect Linux systems is tied to a sophisticated cyberespionage operation of Russian origin dubbed Epic Turla, security researchers found.
For the past two years, a team of Iranian hackers has compromised computers and networks belonging to over 50 organizations from 16 countries, including airlines, defense contractors, universities, military installations, hospitals, airports, telecom...
A variant of the Remote Control System (RCS) malware developed by an Italian company called Hacking Team is masquerading as a bookmark management application called Linkman, according to the main developer of a new malware scanning tool.
Attackers have started using the Citadel Trojan program to steal master passwords for password management applications and other authentication programs.
A free tool released Thursday allows users to scan their computers for surveillance malware that has been used in attacks against journalists, human rights defenders and political activists around the world.
A malware program distributed recently through a rogue server on the Tor anonymity network was also used in targeted attacks against European government agencies.
For the first time since Stuxnet was discovered in 2010, researchers have publicly named the worm's original victims: five Iranian companies involved in industrial automation.
For the past four years a group of sophisticated hackers has compromised the networks of luxury hotels to launch malware attacks against corporate executives and entrepreneurs traveling on business in the Asia-Pacific region.
Attackers have used rogue applications for both OS X and Windows to infect iPhones and iPads in China with a malware program that steals contact information and other private data.
A cyberespionage group that has built its operations around a malware program called BlackEnergy has been compromising routers and Linux systems based on ARM and MIPS architectures in addition to Windows computers.
Gadgets & Things
Most Popular Reviews
- 1 Finally! LG OLED TV 2016 range review
- 2 Huawei Nova Plus smartphone review
- 3 Apple iPhone 7 Plus review: including Portrait Mode
- 4 Google Daydream View VR full, in-depth review
- 5 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
Join the PC World newsletter!
Latest News Articles
- Raspberry Pi's new computer for industrial applications goes on sale
- Social networks let the rich buy influence
- 5G spectrum squatting case ends in $100M FCC fine
- Dash cam review: The Garmin Dash Cam 35 is a little bigger and better for the price
- Dash cam review: The Cobra CDR895D Drive HD offers affordable dual-channel video
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- The top 10 best and worst tech gadgets and products of 2016
- TV of the year award 2016
- Best phone of the year 2016
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- FTBrand Marketing Manager - Premium Entertainment BrandNSW
- FTBI Report DeveloperQLD
- CCSolution Delivery Manager / Project ManagerNSW
- FTMicrosoft Dynamics AX Finance ConsultantQLD
- FTRegional Sales Manager - Telco/ICT - Employer of choiceQLD
- TPProject Manager - EnterpriseACT
- TPProjects Planning ManagerQLD
- CC3x DevOps / Integration Developers l AWS- Cloud- Linux- Puppet Ansible- JIRA-DNSW
- CCService Desk Consultant-Baseline Clearance RequiredNSW
- FTEnterprise Account ManagerACT
- CCFIS Connex Developer (Brisbane Based)VIC
- CCSenior Full-stack .Net DeveloperNSW
- FTSystems AnalystSA
- CCIT Solutions ArchitectQLD
- CCSenior Business AnalystSA
- FTChief Architect - Public SectorACT
- CCSenior Murex DeveloperVIC
- FTMedia Architect/LeadNSW
- CCWeb Architect - Ruby, Python, Java, Open sourceNSW
- CCSenior Developer - Appian/PegaVIC
- TPService Desk AnalystVIC
- CCFIS Connex Developer (Brisbane Based)NSW
- TPDigital Business Analyst | AgileQLD
- TPFinancial Project management - Multiple grant programsNSW
- FTTechnical Business AnalystVIC