So this guy at AirTight Networks says Wi-Fi Protected Access 2 has a "hard shell on the outside, but a soft underbelly inside"due to an overlooked vulnerability, and an attacker can decrypt traffic that's been encrypted with WPA2. Is this total panic...
The more I use the HTC Incredible, the more I like it. And the thing that really makes the Incredible, er, incredible is its operating system, Android<.
The world is almost out of IP addresses--or at least it's almost out of the IPv4 addresses that IT admins and users are most familiar with. Fortunately, IPv6 has been developed to exponentially expand the pool of available IP addresses while also pro...
The continuing saga of Google's wireless snooping and the maelstrom it's generated won't end anytime soon.
Terry Childs' guilty conviction struck a nerve with IT staffers this week.
On March 5, I stepped off a plane at Port-au-Prince airport and was confronted by two things: oppressive heat and chaos. Down the stairs and onto the tarmac we went. It looked like a war zone. But it was actually the aftermath of the tremendous earth...
The world's longest cruise ship posed knotty wireless networking problems but also provided Royal Caribbean the opportunity to pounce on iPhones, touchscreens and MPLS networking in order to deliver luxury services.
The recent formal approval of the IEEE 802.11n wireless standard marks not the end but the start of a wave of Wi-Fi innovation. In the next three to five years, the Wi-Fi experience will be very different from today.
In honor of the 802.11n WiFi standard getting close to arriving after wandering through the desert for 40 years, let's look at wireless. Our focus today is on helping you WiFi better, even if it means doing less WiFi.
Technology vendors have often been on the cutting-edge of technology innovation, but the same can't always be said of their design. Manufacturers have more often been concerned about what's inside the box, devoting less time and resources to the look...
As more enterprises deploy wall-to-wall Wi-Fi, they're finding end users voting with their network interface cards: given a choice, they go with wireless rather than wired access.
When you look at the worst corporate security breaches, it's clear that network managers keep making the same mistakes over and over again, and that many of these mistakes are easy to avoid.
It's been said that Microsoft Word users only exploit 10% of the software's capabilities.
Just because you don't have a large enterprise doesn't mean you can't run your IT operation like the big guys. Here are seven ways to help your SMB--a small or medium-size business--implement some of the lessons big IT operations have learned over th...
The digital Disneyland of the future -- where we freely work and play online -- may be at risk. Why? Because, some argue, broadband carriers can't support it. The Internet's "free ride" culture has led to more people downloading gigabytes of data at ...
Most Popular Reviews
- 1 Samsung Galaxy Note 7 review
- 2 Portable power: Venom Blackbook 13 Zero review
- 3 Alcatel Idol 4S review: King of the mid-range?
- 4 Witness a 241% Australian price hike: Dell Latitude 7370 review
- 5 Is this the best value phone on the market? Moto G4 Plus review
Join the PC World newsletter!
Latest News Articles
- Say hello to old friend Dell Technologies on Sept. 7
- DARPA sees IoT and AI as weapons to dominate wars
- BitTorrent client is found distributing Mac-based malware
- Get started in data science: 5 steps you can take online for free
- Okta partners with Google to secure cloud identities
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
- CCSAP Program Manager - CBDNSW
- CCWebmaster content managementACT
- CCPersonal AssistantVIC
- CCNetwork Implementation EngineerNSW
- CCProject Manager - open source softwareACT
- CCSalesforce CRM ManagerNSW
- FTIT Infrastructure EngineerSA
- FTSenior Full Stack .Net DeveloperVIC
- FTSenior IoT / M2M .Net DeveloperVIC
- FTStorage EngineerSA
- FTDigital Product Owner | Advertising Technology | SearchNSW
- CCBusiness Intelligence Business AnalystSA
- CCSr Project Manager - BASELINEACT
- CCContract Analyst Programmer (JBoss/J2EE/SQL) 160830/AP/193Asia
- CCContract Junior Programmer (JAVA/J2EE/SQL) 160902/JP/709Asia
- FTApplications Support / Systems Administrator | DefenceACT
- CCProgram CoordinatorVIC
- CCSolution Architect - Data MigrationVIC
- CCSolution Architect - WMS/LogisticsVIC
- CCSharepoint ArchitectACT
- FTUNIX, LINUX , VM System AdministrationNSW
- CCSenior Project Specialist - Network IPVIC
- CCChange AnalystNSW
- CCContract Programmer (IT Security/Website Admin.) 160824/P/567Asia
- CCSolution Designer - Windows UpgradeNSW