It's tough to keep track of all of your passwords. In spite of advances in biometrics, and increased attention on the value of two-factor authentication, passwords remain the primary means of digital security. They're also one of the weakest links in...
Mac OS X is inherently secure, but there are a handful of steps you can take to tighten things even further. Here's how to improve your Mac's security.
What are the essential ingredients for making a security awareness program successful? Check out these 9 tips from CSO contributors on how to make awareness work in your organization.
The enterprise has gone mobile and there's no turning back. And while the BYOD movement has received plenty of attention, IT departments are getting a handle on the security risks of personal mobile devices in the workplace. The next challenge is "br...
Paranoia--in small doses--is an excellent preventive medicine. If you think your business is too small to be a target for hackers, identity thieves, and similarly unsavory characters, you're dangerously underestimating the value of your business.
In the aftermath of RSA saying that its SecureID two-factor authentication tokens may have been compromised in a data breach of the company's network, here are some key questions and answers about the situation.
PDF files are one of the most common, and most trusted document formats out there. However, that trust, combined with the cross-platform use of PDFs makes the Adobe file format one of the most targeted and exploited by malicious attacks as well.
A Web hack that can endanger online banking transactions is ranked the No. 1 new Web hacking technique for 2010 in a top 10 list selected by a panel of experts and open voting.
It's a CIO's worst nightmare: You get a call from the Business Software Alliance (BSA), saying that some of the Microsoft software your company uses might be pirated.
Most of us don't like paying for antivirus (AV) software, but at least home users can rely on one of the free options, such as Microsoft Security Essentials, avast!, or AVG Free.
Most Popular Reviews
- 1 Samsung Galaxy Note 7 review
- 2 Portable power: Venom Blackbook 13 Zero review
- 3 Alcatel Idol 4S review: King of the mid-range?
- 4 Witness a 241% Australian price hike: Dell Latitude 7370 review
- 5 Is this the best value phone on the market? Moto G4 Plus review
Join the PC World newsletter!
Latest News Articles
- Facebook to begin testing its Internet drone this year
- Apple's Q1: Record $US18.4 billion profit, but iPhone sales are slowing
- Vodafone puts idle smartphones to work to fight cancer
- A look at the connected police car concept (+12 photos)
- Google buys maker of fascinating, creepy robots
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCContract Systems Analyst (Datacentre Maintenance) 160817/SA/993Asia
- FTSenior Full Stack .Net DeveloperNSW
- CCData ModellerACT
- FTClient Engagement ManagerVIC
- CCChange AnalystNSW
- CCQuality AnalystNSW
- CCSolution Designer - Windows UpgradeNSW
- CCTest Analyst - Data MigrationACT
- CCContract Analyst Programmer (JAVA/J2EE/Oracle) 160822/AP/259Asia
- CCLinux EngineerVIC
- CCProject Coordinator (Paying $400-$450 per day)NSW
- FTApplication Support ManagerNSW
- CCSenior Business Analyst/Designer, Funds ManagementNSW
- FTBack End Developer - Java, Spring, RESTNSW
- CCAsset Transfer Specialist | TelecommunicationVIC
- CCProject Manager (Application Dev. & Mgt.) 160906/PM/472Asia
- CCBI-Business Intelligence Technical LeadNSW
- CCWebmaster content managementACT
- CCProgram Director, Cyber Security TransformationNSW
- CCProject Manager - Expense Management SystemVIC
- FTMiddleware - DevOps EngineerVIC
- CCICT Security Design & Implementation - NV1ACT
- CCIT Program Manager - TelecommunicationsNSW
- CCMS Access DeveloperNSW
- CCData Centre Solutions Architect - Red Hat, Wintel & VMwareACT