An all-in-one security suite that puts a focus on parental features and safe social networking
Dropcam Echo review: A live streaming camera and app that are easy to set up and access
Avira AntiVir Personal review: Great malware protection
BitDefender Antivirus Pro 2011 offers good detection of known malware
Avast Free Antivirus 5 review: This free antivirus package offers quick scan speeds
Millions of routers and other embedded devices are affected by a serious vulnerability that could allow hackers to compromise them.
Adult Friend Finder, one of the largest online dating sites, may have been breached more than two months ago, and the sensitive files -- include names, ages, email addresses, zip codes and more -- are apparently still online.
security in pictures
The experts weigh in on their top picks for protecting enterprise networks.
In an era when businesses are scrambling to defend against sophisticated advanced persistent threats (APTs), signature-based antivirus may seem like a relic.
Technical advances -- and questionable use -- are fast accelerating the need for policies regarding the unmanned future of our skies
Interop 2015 features products from networking, Cloud, virtualisation and security vendors.
Connected cars will mean mobile traffic jams, US wants to ban export of some security tools, exploits...Google planning IoT OS...and more tech news.
It's common sense to reset an Android phone to its factory state before selling or disposing of it. But beware, researchers recently found that this often fails to properly wipe all sensitive user data from the device.
If you think drones are more than slightly creepy, wait until you meet one that will autonomously follow you and record video.
A mobile browser owned by China's Alibaba Group contained privacy risks that could have exposed users' personal data, according to a security group.
Charles Tendell is trying to repair a reputation problem for his website, Hacker's List.
FreeOTFE may sound like a political bumper sticker, but it stands for "Free On The Fly Encryption." The "Free" part is self-explanatory; "On The Fly Encryption" refers to the encrypting/decrypting of data as it is written to or read from your hard di...
Many reasons exist for why you might want or need to "security wipe" a BlackBerry, or completely erase all personal data stored on your handheld: You got a new smartphone and plan to retire the older device; you're trading in your existing BlackBerry...
Today is the final Microsoft Patch Tuesday for 2010. It has been a busy year for Microsoft when it comes to security bulletins, and December is no exception as Microsoft closes out the year with a record 17 security bulletins. With only a week or so ...
A security researcher today provided a way for users to see whether their e-mail addresses and passwords were among the 1.3 million compromised in a hack of Gawker Media's sites.
Despite the convenience, free public Wi-Fi networks like those found in hotels, Starbucks, and McDonald's are also a serious risk when it comes to your data and personal information.
As tech companies increasingly rely on analyzing and selling user data to boost revenue, trust is emerging as one of the defining issues of the year for the IT sector.
After six months of contentious debate over U.S. National Security Agency surveillance programs, prompted by leaks from former government contractor Edward Snowden, the third week in December may have marked a major turning point.
Earlier in September, an update to the Google Settings app for Android tipped off that a remote device lock and password reset feature was on its way to the Android Device Manager. This week, the service finally went live for most users through the A...
Police in Austin, Texas, set up sting operations with cars they have under surveillance, watching for thieves to break into them. Marcus J. Carey's Web service, HoneyDocs -- born in the same city -- uses the same concept, only with computer files.
It's tough to keep track of all of your passwords. In spite of advances in biometrics, and increased attention on the value of two-factor authentication, passwords remain the primary means of digital security. They're also one of the weakest links in...
Whitepapers about security
With iOS 8, Apple has acknowledged the need for tighter IT controls through its addition of business-ready MDM features. But alone, they aren’t enough to meet enterprise security requirements. Get 5 tips to consider with new iOS 8 features.
Most Popular Reviews
- 1 Apple MacBook (early 2015) review: Almost a game changer
- 2 Microsoft Surface 3 Windows 8.1 tablet
- 3 HP Spectre x360 convertible laptop
- 4 Intel NUC Kit (NUC5i5RYH) Mini PC
- 5 Dell XPS 13 laptop (early 2015 model)
Join the PC World newsletter!
Best Deals on GoodGearGuide
Latest News Articles
- Adblock browsers for Android and iOS to keep mobile ads, tracking at bay
- Torque G02 smartphone doesn't mind a saltwater dunk
- The Upload: Your tech news briefing for Friday, May 22
- Factory reset in Android phones leaves sensitive user data behind
- Secom security drone follows, photographs intruders
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
- FTSenior Digital B2B Sales Manager | Household BrandNSW
- FTKey Account ManagerNSW
- CCMobile Designer / Developer - IOSNSW
- FTSENIOR FORMS ANALYST (13767)QLD
- FTSenior Sales Executive X 3 World Leading Music Streaming PlatformNSW
- FTApplication Security SpecialistNSW
- FTSenior SQL DBANSW
- CCMobile Designer / Developer - IOSNSW
- FTSMB Direct Sales Account Executive | Largest Global Online MarketplaceNSW