Technical advances -- and questionable use -- are fast accelerating the need for policies regarding the unmanned future of our skies
privacy in pictures
It's OK to be paranoid about every last detail when it comes to security.
It's not just your boss or the government that's spying on you, it's also the devices and technologies you embrace.
Technology is not evil, only its use or misuse.
A fresh analysis of documents disclosed by former U.S. intelligence contractor Edward Snowden shows that AT&T has been a much closer and eager partner for the National Security Agency's Internet spying activities than was previously known.
Mozilla wants to make private browsing truly private.
It's possible for companies to design their encryption systems to allow law enforcement agencies to access customer data with court-ordered warrants while still offering solid security, U.S. Department of Justice officials said.
If you're worried about Big Brother monitoring you from security cameras, Japan has developed eyewear that can keep you anonymous.
A talk about a radio-based privacy device dubbed ProxyHam that promised to allow hackers to connect to Wi-Fi networks from as far as 2.5 miles away was abruptly pulled from the DEF CON schedule by its creator a few weeks ago.
A security researcher today provided a way for users to see whether their e-mail addresses and passwords were among the 1.3 million compromised in a hack of Gawker Media's sites.
In 2003, author and security pioneer Simson Garfinkel conducted a study of data he found on second-hand hard drives. On eBay, Garfinkel bought the hard drive from an old ATM machine; it held 827 bank account PINs. Another drive he purchased on eBay h...
Your digital photo files hold all sorts of interesting information. You probably know that you can find the date and time taken, date modified, and exposure information in your photo's metadata.
As tech companies increasingly rely on analyzing and selling user data to boost revenue, trust is emerging as one of the defining issues of the year for the IT sector.
After six months of contentious debate over U.S. National Security Agency surveillance programs, prompted by leaks from former government contractor Edward Snowden, the third week in December may have marked a major turning point.
Vague policies, rogue apps, zombie phones can doom even the best Bring Your Own Device intentions. But the good news is it's not too late to make game-changing adjustments.
The US presidential election result leaves President Barack Obama in the White House and maintains the balance of power in Congress. In many longstanding technology debates, policy experts see little movement forward, although lawmakers may look for ...
Facebook has been in the media spotlight this year over privacy concerns, thanks in part cases such as the horrific murder of Sydney teenager Nona Belomesoff.
Whitepapers about privacy
As your organization implements BYOD, it’s important to maintain compliance with data security and privacy regulations. This paper provides some key best practices to avoid problems and stay vigilant. • Poor compliance can result in financial penalties, litigation and damage to your company’s reputation • Make sure you have the IT solutions you need to avoid data leaks, avert data loss and prevent unauthorized access to information • Employ solutions designed to streamline BYOD management and simplify the process of proving compliance
Most Popular Reviews
- 1 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 2 D-Link Taipan AC3200 Ultra tri-band modem-router review
- 3 BlackBerry Priv review: When old habits die hard
- 4 Dell XPS 13 (2016) review: Making the very best Ultrabook
- 5 Microsoft Surface Book review: The verdict on Microsoft's first notebook
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- New Chromebook won't break with 365-pound person standing on it
- Nasdaq to use blockchain to record shareholder votes
- Pwn2Own contest puts $75,000 bounty on VMware Workstation bypass
- Intel SSDs may get speed, capacity boost with new Micron chips
- Apple's iPhone sued for infringement of touch feedback patents
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
- FTDigital Marketing Specialist | Media BuyerNSW
- CCSenior Wintel EngineerNSW
- FTSenior Performance Test AnalystNSW
- PTService Desk OperatorSA
- FTBusiness Analyst (SCADA / CSI)VIC
- CCProject Manager IT infrastructureACT
- CCSystem AdminVIC
- FTJava Full Stack Developer - MelbourneVIC
- CCData Stage DeveloperNSW
- CCContract System Analyst (Linux/Security/LAN) 160211/SSA/521Asia
- CCContract Analyst Programmer (JAVA/J2EE/SQL) 160205/AP/541Asia
- CCMVC .Net Developer- Hurstville NSW 2220NSW
- FTSenior Front End Developer Required Working World Leading Digital TeamVIC
- CCSenior Business Analyst - Life InsuranceVIC
- CCSenior Identity ManagerVIC
- CCSenior Project Manager, Research Data ProjectNSW
- CCEXCEL Guru / Data AdministratorNSW
- FTFront End Developer Required Working World Leading Digital TeamNSW
- CCContract System Analyst (Website/PHP development) 160122/SA/vmtAsia
- CCImmediate iOS Developer Required - Contract - SydneyNSW
- FTNetwork Systems LeadVIC
- CCProject ManagerACT
- FTSecurity ArchitectWA
- CCApplication Support AnalystNSW
- CCHybris Developer - Global ConsultancyNSW