Western Digital delivers 1TB of storage and good security in a portable package
Researchers have developed a new technique that could allow attackers to determine with a high degree of accuracy which Tor websites users are accessing and where those websites are hosted.
A group of suspected Russian hackers are using Twitter in a clever way to mask their data-stealing malware, according to computer security firm FireEye.
There's an old saying in the security community: Attacks always get better. The latest case where that holds true is for the aging RC4 cipher that's still widely used to encrypt communications on the Internet.
A flaw in the widely used OpenSSL library could allow man-in-the-middle attackers to impersonate HTTPS servers and snoop on encrypted traffic. Most browsers are not affected, but other applications and embedded devices could be.
U.S. Secretary of Defense Ash Carter will renew his appeal to businesses to work more closely with the military on Thursday when he speaks to an audience of top executives at the Sun Valley conference in Idaho.
FreeOTFE may sound like a political bumper sticker, but it stands for "Free On The Fly Encryption." The "Free" part is self-explanatory; "On The Fly Encryption" refers to the encrypting/decrypting of data as it is written to or read from your hard di...
Despite the convenience, free public Wi-Fi networks like those found in hotels, Starbucks, and McDonald's are also a serious risk when it comes to your data and personal information.
Losing your laptop can be expensive in three ways. First, you'll spend hundreds or thousands of dollars to replace the hardware. Second, you'll suffer the time and aggravation of restoring your data, all the while hoping you have everything backed up...
Paranoia--in small doses--is an excellent preventive medicine. If you think your business is too small to be a target for hackers, identity thieves, and similarly unsavory characters, you're dangerously underestimating the value of your business.
Yet another survey is indicating that security is a big issue for those intending to take up cloud computing.
The largest single type of security breach is the stolen or lost laptop, according to the Open Security Foundation, yet these computers are among the least protected of all IT assets. The costs of a data breach can be huge, including the loss of trad...
Whitepapers about encryption
As of September 2013, a new and vicious form of malware has been wreaking havoc. CryptoLocker belongs to a family of malware called “ransomware”, which is designed to extort money from victims by denying them access to their personal files. It targets all Windows Operating Systems, from Windows XP to Windows 8, and typically remains unnoticed by victims until it’s too late and the damage to their files is irreparable.
Most Popular Reviews
- 1 Motorola Moto X Style review: A no compromise flagship
- 2 Oppo R7 Plus review: a stellar sub-$600 phablet
- 3 Samsung Galaxy Tab S2 (9.7) 4G review: Samsung does a lot more with a lot less
- 4 Motorola Moto G (3rd gen) review: Is it worth an extra $100?
- 5 Jawbone UP3 review: 3 months with Jawbone's best fitness tracker
Join the PC World newsletter!
Deals on PC World
- Networking, Wireless & VoIP
Deals on PC World
Latest News Articles
- Verizon will use its mobile supercookie to target customers with AOL ads
- EU Safe Harbor ruling could have bearing on Microsoft email dispute
- IPsoft's 'Amelia' virtual assistant just got a whole lot more human
- Surface Pro 4 on sale at Microsoft's Sydney store on November 12
- Microsoft makes serious smartphone play with Lumia 950 range
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTDatabase Marketing ManagerNSW
- CCMilitary simulation programmer with C# and Unity - 3 monthsNSW
- FTSystems Administrator - Managed ServicesNSW
- FTMid level IT consultant | Systems Integration & Managed ServicesNSW
- FTAccount Manager | Client Side - Previous Agency Experience Welcome!!NSW
- FTAndroid DeveloperNSW
- FTField EngineerNSW
- FT1st & 2nd level IT support all-rounder in beautiful rural BathurstNSW
- FTSenior Account Manager - PR AgencyNSW
- FTSystems Administrator | National commercial law firm | MS, AWS & eDiscoveryNSW
- FTAccount Manager | Music IndustryNSW
- FTLinux Administrator with AWS & DevopsNSW
- FTProduct Marketing ManagerNSW
- FTLevel 2 IT Support TechnicianVIC
- CCE-Commerce - Senior Web Application DeveloperNSW
- FTSales SpecialistNSW
- FTBusiness Development & Account ManagementNSW
- FTSenior Consultant | Project work | National Systems IntegratorVIC
- FTManual Test Engineer | Financial Institution | Web testingNSW