Security

Fear of insider threats hits home

The more money that companies spend on securing their IT operations from external attack, the more it seems they become aware that the potential threat posed by their own employees remains their most significant risk.

The eight most dangerous consumer technologies

High-tech consumer products and services of all kinds are making their way into the workplace. They include everything from smart phones, voice-over-IP systems and flash memory sticks to virtual online worlds. And as people grow more accustomed to ha...

Balancing Generation Y preferences with security

As young adults who grew up on e-mail and online chat enter the workforce, they bring with them a set of newer technologies designed for rapid-fire communication and workplace personalization. Much of this technology may represent better, faster ways...

The Monster.com mess

The last thing you need when you're unemployed is a bank account that's suddenly emptied. But that's exactly what some unwary users of US employment search site Monster.com faced after identity thieves made off with the personal information of more t...

How to neutralize today's worst Web attacks

Symantec recently posted details about a new version of MPack, a <a href=" http://www.symantec.com/enterprise/security_response/weblog/2007/08/mpack_getting_more_dangerous.html">for-sale Web attack kit</a> that loads up a site with exploits against W...

Clearswift makes a clean sweep of Web threats

Mitigating network-borne threats has been an imperative to companies of all sizes and statures. As if malware and viral infestation weren't enough, today's corporations must contend with even bigger bugs, including regulatory compliance, information ...

How close is World War 3.0?

When the Estonian government was hit with major, sustained denial-of-service attacks this spring, the headlines screamed that it was the first incident of modern cyber warfare.

Best practices for online shopping

My former graduate student Steven Zeligman has just submitted another article for the column. Here are his practical suggestions (with the usual editing from me) on improving the security of shopping online.

Oh, don't tell me: 10 claims that scare security pros

A child with a chocolate-smeared shirt says, "I didn't do it." The phone rings, and Mum assures you, "There's nothing to worry about." A systems administrator carrying a box of tapes says, "We'll have everything back up in a few minutes." Sometimes t...

Latest News Articles

Most Popular Articles

Follow Us

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Resources

Best Deals on GoodGearGuide

Compare & Save

Deals powered by WhistleOut
Use WhistleOut's technology to compare:
Mobile phone plans & deals
Mobile phone models
Mobile phone carriers
Broadband plans & deals
Broadband providers
Deals powered by WhistleOut
WhistleOut

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?