So this guy at AirTight Networks says Wi-Fi Protected Access 2 has a "hard shell on the outside, but a soft underbelly inside"due to an overlooked vulnerability, and an attacker can decrypt traffic that's been encrypted with WPA2. Is this total panic...
The more I use the HTC Incredible, the more I like it. And the thing that really makes the Incredible, er, incredible is its operating system, Android<.
The world is almost out of IP addresses--or at least it's almost out of the IPv4 addresses that IT admins and users are most familiar with. Fortunately, IPv6 has been developed to exponentially expand the pool of available IP addresses while also pro...
The continuing saga of Google's wireless snooping and the maelstrom it's generated won't end anytime soon.
Terry Childs' guilty conviction struck a nerve with IT staffers this week.
On March 5, I stepped off a plane at Port-au-Prince airport and was confronted by two things: oppressive heat and chaos. Down the stairs and onto the tarmac we went. It looked like a war zone. But it was actually the aftermath of the tremendous earth...
The world's longest cruise ship posed knotty wireless networking problems but also provided Royal Caribbean the opportunity to pounce on iPhones, touchscreens and MPLS networking in order to deliver luxury services.
The recent formal approval of the IEEE 802.11n wireless standard marks not the end but the start of a wave of Wi-Fi innovation. In the next three to five years, the Wi-Fi experience will be very different from today.
In honor of the 802.11n WiFi standard getting close to arriving after wandering through the desert for 40 years, let's look at wireless. Our focus today is on helping you WiFi better, even if it means doing less WiFi.
Technology vendors have often been on the cutting-edge of technology innovation, but the same can't always be said of their design. Manufacturers have more often been concerned about what's inside the box, devoting less time and resources to the look...
As more enterprises deploy wall-to-wall Wi-Fi, they're finding end users voting with their network interface cards: given a choice, they go with wireless rather than wired access.
When you look at the worst corporate security breaches, it's clear that network managers keep making the same mistakes over and over again, and that many of these mistakes are easy to avoid.
It's been said that Microsoft Word users only exploit 10% of the software's capabilities.
Just because you don't have a large enterprise doesn't mean you can't run your IT operation like the big guys. Here are seven ways to help your SMB--a small or medium-size business--implement some of the lessons big IT operations have learned over th...
The digital Disneyland of the future -- where we freely work and play online -- may be at risk. Why? Because, some argue, broadband carriers can't support it. The Internet's "free ride" culture has led to more people downloading gigabytes of data at ...
Most Popular Reviews
- 1 Witness a 241% Australian price hike: Dell Latitude 7370 review
- 2 Is this the best value phone on the market? Moto G4 Plus review
- 3 Sony Xperia X Performance review: Sony’s most disappointing product in years
- 4 Huawei P9 review: lifting photography to another level... sometimes.
- 5 Huawei Mate 8 review: probably the best all-round Android phone you can buy
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- Windows 7 PCs with free OS upgrade are still available, for now
- SwiftKey's typing predictions may have leaked users' emails
- New Android Trojan SpyNote leaks on underground forums
- ISP groups appeal net neutrality court defeat
- IBM's Cloud CTO: 'We're in this game to win'
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
- FTSocial Media AssistantQLD
- CCSenior Project ManagerACT
- CCInfrastructure Project ManagerACT
- CCApplication Service TechnicianVIC
- CCStrategic Business AnalystNSW
- CCService Coordinator/HelpdeskWA
- CCSenior Tester - Automation / Telecommunications (Urgent)NSW
- CCContract Analyst Programmer (J2EE/SQL Server) 160812/AP/553Asia
- CCDatabase AdministratorNSW
- FTData AnalystACT
- CCEnterprise Data Business AnalystNSW
- CCBusiness Analyst (ERP)NSW
- CCSenior Citrix EngineerNSW
- CC.NET DeveloperQLD
- FTIT ManagerNSW
- CCTechnical Architect - CloudNSW
- FTSystems Administrator | Defence | NV1 / NV2 clearedACT
- CCSAP Solution ArchitectACT
- CCSenior Process Analyst - Sydney CBDNSW
- FTSAS Support SpecialistNSW
- FTSystems Engineer | Defence | NV1 / NV2 clearanceACT
- FTIdentity Systems Analyst / Solution DesignerACT
- CCAnalyst Programmer (JAVA/Oracle RDBMS/UNIX) 160810/AP/713Asia
- CCHelpdesk OfficersNSW
- CCSolution Architect - IntegrationSA