A ‘white hat’ is an ethical computer hacker or cyber security expert. White hat hackers often conduct exploratory testing to ensure an organization or computer system is properly protected.
Advanced Persistent Threats (APTs) are the plague of enterprise security, crippling businesses and IT careers through costly data breaches and massive losses. Their goal is to steal intellectual property, and confidential company information. They ro...
The FBI has issued a plea for those who have been hit by ransomware to report this to federal law enforcement so that the country can get a better sense of just how bad this problem really is.
It's tough to keep track of all of your passwords. In spite of advances in biometrics, and increased attention on the value of two-factor authentication, passwords remain the primary means of digital security. They're also one of the weakest links in...
Mac OS X is inherently secure, but there are a handful of steps you can take to tighten things even further. Here's how to improve your Mac's security.
What are the essential ingredients for making a security awareness program successful? Check out these 9 tips from CSO contributors on how to make awareness work in your organization.
The enterprise has gone mobile and there's no turning back. And while the BYOD movement has received plenty of attention, IT departments are getting a handle on the security risks of personal mobile devices in the workplace. The next challenge is "br...
Paranoia--in small doses--is an excellent preventive medicine. If you think your business is too small to be a target for hackers, identity thieves, and similarly unsavory characters, you're dangerously underestimating the value of your business.
In the aftermath of RSA saying that its SecureID two-factor authentication tokens may have been compromised in a data breach of the company's network, here are some key questions and answers about the situation.
PDF files are one of the most common, and most trusted document formats out there. However, that trust, combined with the cross-platform use of PDFs makes the Adobe file format one of the most targeted and exploited by malicious attacks as well.
Gadgets & Things
Most Popular Reviews
- 1 Finally! LG OLED TV 2016 range review
- 2 Huawei Nova Plus smartphone review
- 3 Apple iPhone 7 Plus review: including Portrait Mode
- 4 Google Daydream View VR full, in-depth review
- 5 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
Join the PC World newsletter!
Latest News Articles
- Samsung's 960 Pro and 960 Evo SSDs marry crazy-fast speeds with roomy capacity
- Start-up sells a stamp-sized Linux server for $5
- Boom: SanDisk just dropped the world's largest SD card
- IBM targets x86 server territory with new Power servers
- As Dell and HPE revamp, Lenovo sets sights on enterprise cloud servers
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- The top 10 best and worst tech gadgets and products of 2016
- TV of the year award 2016
- Best phone of the year 2016
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- FTBrand Marketing Manager - Premium Entertainment BrandNSW
- FTTechnical Consultant MS Dynamics AXWA
- FTLevel 2 Service DeskNSW
- CCBiztalk DeveloperVIC
- FTInfrastructure Solution ArchitectSA
- FTMicrosoft Dynamics AX Finance ConsultantWA
- TPLevel 3 Systems EngineerWA
- FTDeveloper - Java, Mule ESBNSW
- CCApplication PackagerVIC
- CCFIS Connex Developer (Brisbane Based)NSW
- FTLevel 3 EngineerNSW
- FTAccount Delivery LeadNSW
- FTTechnical ExpertNSW
- CCCapacity and Performance Analyst - Mainframe - Z SystemsVIC
- CCFIS Connex Developer (Brisbane Based)WA
- TPProject Manager with a Development BackgroundQLD
- TPSharePoint SpecialistVIC
- TPInternal Controls Specialist - BAQLD
- CCDevops EngineerVIC
- CCTest AnalystQLD
- CCVirtualization ArchitectACT
- FTIT Field EngineerNSW
- FTLevel 3 Support ConsultantNSW
- FTBusiness Solutions SpecialistNSW
- TPOracle DeveloperVIC