Locky, a new family of ransomware that emerged in the last few weeks, has quickly made a mark for itself.
A revised patch has been released for a flaw in the distribution platform for Ruby applications, RubyGems, which could be used to deliver malware to someone trying to download a program.
The data breach landscape could look very different in the future with the increased adoption of chip-enabled payment cards in North America -- but for now point-of-sale systems account for the majority of breaches there, compared to a tiny minority ...
Cybercriminals are targeting employees who browse the Web or check their email from point-of-sale (PoS) computers, a risky but unfortunately common practice.
A botnet designed for Web advertising fraud was also used to nudge up the number of views of some pro-Russian videos on the website DailyMotion, according to security vendor Trustwave.
SAP patched a flaw on Thursday that could allow an attacker to take complete control over a database, according to security vendor Trustwave.
Point-of-Sale (PoS) terminals have become an attractive target for hackers over the past year, reflected in the increasing number of RAM-scraping programs that steal payment card information from the memory of such systems.
Microsoft to show next Office apps... Intel shrinks RealSense 3D camera for phones... U.S. drug agency started bulk records collection in 1992... and more tech news.
SingTel will acquire TrustWave Holdings, the largest U.S. independent provider of managed security services, for $810 million, the companies said on Tuesday.
The White House heads west to Silicon Valley on Friday looking for ideas on how to improve the nation's cybersecurity, and members of President Barack Obama's administration are likely to get an earful.
A critical vulnerability in glibc, a core Linux library, can be exploited remotely through WordPress and likely other PHP applications to compromise Web servers.
For the past several months, different groups of attackers have distributed malware through Microsoft Office documents that contain malicious macros, reviving a technique that has been out of style for over a decade.
A malware program dubbed Spark that steals payment card data from compromised point-of-sale (POS) systems is likely a modification of an older Trojan called Alina, and highlights a continuing, lucrative business for cybercriminals.
A security researcher has developed a tool to demonstrate how the unauthenticated data packets in the 802.11 wireless LAN protocol can be used as a covert channel to control malware on an infected computer.
Users who are careful to download files only from trusted websites may be tricked by a new type of Web vulnerability: this one cons them into downloading malicious executable files that are not actually hosted where they appear to be.
Most Popular Reviews
- 1 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 2 D-Link Taipan AC3200 Ultra tri-band modem-router review
- 3 Dell XPS 13 (2016) review: Making the very best Ultrabook
- 4 Microsoft Surface Book review: The verdict on Microsoft's first notebook
- 5 Telstra Wi-Fi 4GX Advanced III review: Testing the world's first 600Mbps wireless hotspot
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- Move over Skylake: An Asus PC with Intel's Kaby Lake chip is coming in Q3
- Nvidia chief downplays challenge from Google’s AI chip
- Flaw in popular WordPress plug-in Jetpack puts over a million websites at risk
- Asus unveils Zenbo, a cute robot for the home priced at $599
- Australia lagging decades behind in cyber security efforts: ACCS
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCIteration Manager/Agile Project ManagerNSW
- FTHadoop Operation EngineerNSW
- FTRelease Planning LeadVIC
- CCOffice 365 Systems EngineerNSW
- CCPHP / Magento E-Commerce DeveloperNSW
- CCExcel DeveloperVIC
- CCNV1 Consultant | Groundbreaking Defence decision support applicationACT
- CCTechnology Team Lead / Senior Developer - JavaNSW
- CCProject Manager PMP RMP certified - NV1ACT
- FTSystems EngineerACT
- CCContract Analyst Programmer (JAVA/SQL/Web) 160519/AP/453Asia
- CCAnalyst Programmer (Enterprise Java Beans/J2EE) 160601/AP/982Asia
- CCDigital Content ProducerVIC
- FTSenior .NET DeveloperWA
- CCTechnical Business Analyst, SuperannuationNSW
- CCDelivery Manager - Integration SpaceVIC
- FTSenior Technical Lead - Java and .NetNSW
- CCSolution ArchitectNSW
- CCSenior Business Analyst, Marketing SystemsNSW
- FTSenior Network Engineer - Australian Systems Integrator - Immediate interviewNSW
- CCContract Programmer (HTML/JAVA/SQL) 160525/P/013Asia
- FTNV1, NV2 Network Engineers | Permanent role with diverse Defence projectsACT
- FTSOE SpecialistACT
- CCEnd to End Project Manager - PMO and GovernanceVIC
- CCSAP Hanna ConsultantNSW