Since 2011 a group of attackers has been targeting companies that operate industrial control systems with a backdoor program called BlackEnergy.
A coalition of security vendors has disrupted the activities of a sophisticated group of attackers tied to China that, over the past six years, infiltrated the computers of many Fortune 500 companies, journalists, environmental groups, software compa...
A cyberespionage group has been using advanced spear-phishing techniques to steal email log-in credentials from the employees of military agencies, embassies, defense contractors and international media outlets that use Office 365's Outlook Web App.
Isolating computers from the Internet, called "air gapping," is considered one of the best ways to defend critical systems and their sensitive data from cyberattacks, but researchers have found that can be undermined using an all-in-one printer.
A cyberespionage group operating out of Russia has launched malware attacks against the Ukrainian government and at least one U.S.-based organization through a previously unknown vulnerability that affects most versions of Windows.
The CEO of a Pakistani company has been indicted in the U.S. for selling a product called StealthGenie that buyers could use to monitor calls, texts, videos and other communications on other people's mobile phones, the U.S. Department of Justice said...
Salesforce.com users are being targeted by a new version of a computer Trojan that has typically attacked online banking customers until now.
A group of hackers known for past cyberespionage attacks against the U.S. Defense Industrial Base, as well as companies from the electronics and engineering sectors, has recently started using a backdoor program to target Mac OS X systems.
Cybercriminals are increasingly infecting computers with malware that resides only in memory in order to make their attacks harder to detect.
Attackers deploy Web-based reconnaissance tool to gather information about potential targets in different industries
The cybercriminal gang behind the Kelihos botnet is tricking users into installing malware on their computers by appealing to pro-Russian sentiments stoked by recent international sanctions against the country.
Cybercriminals are using a new information-stealing malware program to target companies from the automobile industry in Europe, security researchers warned.
A group of attackers with links to the Chinese hacking underground has been targeting companies from the entertainment and video game industries for years with the goal of stealing source code.
The Electronic Frontier Foundation, a digital privacy rights group, has released a downloadable plugin for Chrome and Firefox designed to stop third parties from tracking people's Web browsing.
A new Trojan program designed to steal log-in credentials and other financial information from online banking websites is being advertised to cybercriminal groups on the underground market.
Most Popular Reviews
- 1 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
- 2 Sony Xperia XZ review: turbo-charged last-gen phone
- 3 Hisense Series 7 ULED 4K UHD TV review
- 4 Sony X9300D and X8500D UHD 4K TV review
- 5 Moto X Force review: Leading features from a mid-range phone
Join the PC World newsletter!
Latest News Articles
- AT&T will acquire Time Warner for $85.4B in content play
- Gallipoli is now an amazing video game
- U.S. indicts Russian for hacking LinkedIn, Dropbox, Formspring
- An IoT botnet is partly behind Friday's massive DDOS attack
- Bankers plan to give Corda blockchain code to Hyperledger project
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- Google Pixel XL full, in-depth smartphone review: The new best Android phone
- Japan Robot, gadget and car expo slideshow
- Panasonic DX900U UHD 4K smart TV review: Best all-round TV ever?
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- CCUnix Project LeadNSW
- CCResident Engineer - Nexus 2K, 5K, 7K & 9KNSW
- FTDevOps EngineerVIC
- CCResident Operation Support Engineer (Renewable Contract)Asia
- CCContract Senior Systems Analyst (J2EE/JAVA/Web) 161012/SSA/552Asia
- FTSoftware Developers | .Net 4.6 | Multiple RolesNSW
- CCSenior Business AnalystVIC
- CCContract IT Assistant (System Backup Operation) 161014/ITA/523Asia
- CCIT Senior Systems Administrator- Server Patching RemediationNSW
- CCContract Computer Operator (UNIX/Windows-based) 161014/CO/vmtAsia
- FTHands-on Service Desk Team LeadNSW
- CCProject Manager - Payroll SystemsSA
- CCSystem TestersQLD
- CCAutomation Test AnalystNSW
- CCEnterprise ArchitectNSW
- CCSAP Finance Business AnalystNSW
- FTIntegration SpecialistSA
- CCContract Junior Programmer (J2EE/SQL) 161019/JP/552Asia
- FTBusiness Analyst - PIMAsia
- FTProgram SchedulerNSW
- CC.Net Sitecore DeveloperVIC
- FTSenior Front End DeveloperNSW
- CCSAP FunctionalistACT
- CCCommunications ManagerVIC
- CCData Centre EngineerNSW