Although he acknowledges that businesses have yet to embrace IPv6, security guru Scott Hogg says that doesn't mean IT executives can ignore the security problems that the next generation Internet protocol can present. After all, he notes, operating s...
Forewarned is forearmed. We investigate the latest and most deadly tech dangers, and explain how to fight back.
Phreakers and phishers, cybercrooks and criminals have strutted their stuff over the Internet
A McAfee study estimates 62 trillion spam e-mails equal 33 billion kilowatt hours of electricity or about as much carbon as 3.1 million cars consuming 2 billion gallons of gasoline. In January, a study by Harvard University claimed two Google searche...
Here are our picks for no-cost ways to protect your PC, including Avast Home Edition, SpywareBlaster, and more.
Companies looking to reduce their IT costs and complexity by tapping into cloud computing services should first make sure that they won't be stepping on any privacy land mines in the process, according to a report released this week by the World Priv...
The news that iTunes will offer songs from the three of the largest labels free of copy protection software was music to the ears of many users. Privacy experts say it's a sign the industry is realizing how counter-productive digital rights managemen...
What the average guy might call a con is known in the security world as social engineering. Social engineering is the criminal art of scamming a person into doing something or divulging sensitive information. These days, there are thousands of ways f...
When it comes to managing personal information online, most people are their own worst enemies. Many of us fail to adequately protect our personal data before it gets online, but once information makes its way to the Internet, it can be quickly repli...
Social networks are fun to use, helpful for job hunting, and great for keeping in touch with friends, business contacts, and relatives. The downside: The bad guys know you're using these networks like crazy, and they're gunning for you.
Your everyday office applications store more hidden information in the documents you create and work on than you may be aware of. Here's how to make sure you don't make data public that should remain private.
Your PC's operating system is under constant threat of invasion, whether the attacker's aim is to spread malicious malware or to convince you to buy protective software that is really just a rip-off. Here's how to stand guard.
She had me at hello ... or just about. Our conversation had barely started when privacy activist Betty Ostergren interrupted me to say that she had found my full name, address, Social Security number and a digital image of my signature on the Web.
Security vendor Symantec is using new virtual machine technology to protect Web surfers from online attack.
We know: You mean to do all kinds of things to keep your IT infrastructure in peak condition, but when the office gets busy, things fall through the cracks. The problems won't go away on their own, though. If you need help compiling a list of what yo...
Most Popular Reviews
- 1 HTC One (M8s) review: Better value for money than HTC's flagship
- 2 Apple MacBook (early 2015) review: Almost a game changer
- 3 Microsoft Surface 3 Windows 8.1 tablet
- 4 HP Spectre x360 convertible laptop
- 5 Intel NUC Kit (NUC5i5RYH) Mini PC
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- Breaking Bad-themed crypto-ransomware hits Australian computers
- Microsoft wants to kill passwords with biometric authentication in Windows 10
- How to remove the dangerous Superfish adware preinstalled on Lenovo PCs
- Scareware found hidden in Google Play apps downloaded by millions
- USB Armory is the Swiss army knife of security devices
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTSenior Digital B2B Sales Manager | Household BrandNSW
- FTDigital Marketing Executive | GamingNSW
- FTSenior SQL DBANSW
- CCMobile Designer / Developer - IOSNSW
- CCMobile Designer / Developer - IOSNSW
- FTSMB Direct Sales Account Executive | Largest Global Online MarketplaceNSW
- FTKey Account ManagerNSW
- FTSENIOR FORMS ANALYST (13767)QLD