An all-in-one security suite that puts a focus on parental features and safe social networking
Dropcam Echo review: A live streaming camera and app that are easy to set up and access
Avira AntiVir Personal review: Great malware protection
BitDefender Antivirus Pro 2011 offers good detection of known malware
Avast Free Antivirus 5 review: This free antivirus package offers quick scan speeds
The vast majority of Android phones can be hacked by sending them a specially crafted multimedia message (MMS), a security researcher has found.
security in pictures
Hacking Team, a firm best known for helping governments spy on their citizens, has been hacked. Here's a curated look at the documents, contracts, and code discovered by researchers sorting the data online.
Level 3’s research report analyses botnet activity around the world
As cybercriminals employ increasingly sophisticated tactics to steal identities and data, and the costs and consequences of data breaches skyrocket, here are seven steps that your small business should be taking to insulate themselves from cyberattacks.
Learn how to protect yourself in the Cloud from the next vulnerability and/or wide scale attack.
A group of suspected Russian hackers are using Twitter in a clever way to mask their data-stealing malware, according to computer security firm FireEye.
RFID card access systems are used by most companies to let people into their buildings. But over the last few years, researchers have shown how these systems can be easily bypassed.
U.S. President Barack Obama won't pardon National Security Agency leaker Edward Snowden, despite strong public support for it, the White House said Tuesday.
The former administrator of Darkode, the online cybercrime forum that was recently shut down by law enforcement agencies, is preparing to bring it back, with better security and privacy for its members.
Google will now let enterprise customers of one of its Cloud Platform services lock up their data with their own encryption keys, in case they're concerned about the company snooping on their corporate information.
FreeOTFE may sound like a political bumper sticker, but it stands for "Free On The Fly Encryption." The "Free" part is self-explanatory; "On The Fly Encryption" refers to the encrypting/decrypting of data as it is written to or read from your hard di...
Many reasons exist for why you might want or need to "security wipe" a BlackBerry, or completely erase all personal data stored on your handheld: You got a new smartphone and plan to retire the older device; you're trading in your existing BlackBerry...
Today is the final Microsoft Patch Tuesday for 2010. It has been a busy year for Microsoft when it comes to security bulletins, and December is no exception as Microsoft closes out the year with a record 17 security bulletins. With only a week or so ...
A security researcher today provided a way for users to see whether their e-mail addresses and passwords were among the 1.3 million compromised in a hack of Gawker Media's sites.
Despite the convenience, free public Wi-Fi networks like those found in hotels, Starbucks, and McDonald's are also a serious risk when it comes to your data and personal information.
As tech companies increasingly rely on analyzing and selling user data to boost revenue, trust is emerging as one of the defining issues of the year for the IT sector.
After six months of contentious debate over U.S. National Security Agency surveillance programs, prompted by leaks from former government contractor Edward Snowden, the third week in December may have marked a major turning point.
Earlier in September, an update to the Google Settings app for Android tipped off that a remote device lock and password reset feature was on its way to the Android Device Manager. This week, the service finally went live for most users through the A...
Police in Austin, Texas, set up sting operations with cars they have under surveillance, watching for thieves to break into them. Marcus J. Carey's Web service, HoneyDocs -- born in the same city -- uses the same concept, only with computer files.
It's tough to keep track of all of your passwords. In spite of advances in biometrics, and increased attention on the value of two-factor authentication, passwords remain the primary means of digital security. They're also one of the weakest links in...
Whitepapers about security
With iOS 8, Apple has acknowledged the need for tighter IT controls through its addition of business-ready MDM features. But alone, they aren’t enough to meet enterprise security requirements. Get 5 tips to consider with new iOS 8 features.
Most Popular Reviews
- 1 Kogan Agora 4G Pro review: the final word on Kogan's best smartphone
- 2 Sony Xperia Z4 Tablet (LTE) review: The tablet of choice for anyone on Android
- 3 Bose SoundLink Mini II Bluetooth speaker review
- 4 Apple MacBook Air 2015 review: Only better with time
- 5 Lenovo ThinkPad T550 laptop
Join the PC World newsletter!
Deals on PC World
- Networking, Wireless & VoIP
Deals on PC World
Latest News Articles
- The Upload: Your tech news briefing for Wednesday, July 29
- Russian hackers use Twitter to mask sneaky data theft
- Ink-shooting game 'Splatoon' helps power Nintendo to profit
- On your mark, get set, update! Windows 10 is here
- Nokia rolls out spherical camera for virtual reality apps
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCAccount Strategist | Sales Executive | Global Search EngineNSW
- CCInternal Communications ExecutiveNSW
- CCLead Generator - Software SolutionsNSW
- FTDesktop Engineering ManagerNSW
- FTBusiness Development Manager & Account ManagerVIC
- FTField EngineerNSW
- FTTechnical Sales Support Representative - The Worlds largest Search Engine!NSW
- FTDevOps Consultant - Microsoft Experience - Digital ConsultancyVIC
- FTAccount Manager - PR AgencyNSW
- CCMarketing Coordinator - World's largest search engine!NSW