How the Snowden leaks have contributed to the larger conversation about privacy and security.
The FBI has issued a plea for those who have been hit by ransomware to report this to federal law enforcement so that the country can get a better sense of just how bad this problem really is.
Samsung and other vendors are beginning to incorporate iris scanning into their mobile devices. We examine how this security technology works, its advantages and its drawbacks.
When the cloud was first introduced several years ago, the business world was in awe of the potential it presented but also perplexed at how to harness it. From faster services to better agility and cost savings, the technology revolutionised how peo...
What happens when you delete a file? Unknown to most, deleted data from a mobile phone can still be shared with others if not appropriately managed. In a worst-case scenario, this could end up in the hands of a hacker or e-criminal, and used against ...
The burgeoning market for gadgets that trigger a sprinkler system, help you count the number of times you swing a bat, or dim the lights automatically are rising. That’s a concern for any business due to how these devices are also starting to show up...
Internet security is in crisis. These four proposals offer tangible solutions -- including one scheme to change the Internet's workings from top to bottom
"Hunting is not a sport. In a sport, both sides should know they're in the game." - According to Field and Stream magazine, this is an oft quoted hunting expression. I couldn’t resist the irony of applying this quote to the cyber security industry wh...
In today’s day and age we see a huge amount of excitement around finding the biggest and best presents for kids. Not only this, children are encouraged to surf the web and use mobile apps from a young age. We are seeing toddlers trading toy cars and ...
Business resilience is an organisation’s ability to quickly adapt to disruptions while maintaining continuous business operation, safeguarding people and assets and maintaining or even building brand equity.
Fear of the cloud in today’s security landscape is largely misplaced.
Fraudsters are using legitimate executive names and email addresses to dupe unsuspecting employees to wire money or sensitive documents to their accounts. The CTO of the Boston Celtics, for one, is fighting back.
When their data has been stolen, and is being held hostage, companies are increasingly caving in to cybercriminal demands for payment. Short of paying up, the best defense is a good offense.
As tech companies increasingly rely on analyzing and selling user data to boost revenue, trust is emerging as one of the defining issues of the year for the IT sector.
After six months of contentious debate over U.S. National Security Agency surveillance programs, prompted by leaks from former government contractor Edward Snowden, the third week in December may have marked a major turning point.
Gadgets & Things
Most Popular Reviews
- 1 Finally! LG OLED TV 2016 range review
- 2 Google Daydream View VR full, in-depth review
- 3 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
- 4 Apple iPhone 7 Plus review: including Portrait Mode
- 5 MSI GS70 laptop review
Join the PC World newsletter!
Latest News Articles
- Random iPhone 6s shutdowns due to faulty battery component, Apple says
- Researchers find a way bypass the iOS activation lock
- Remote management app exposes millions of Android users to hacking
- ‘Distributed guessing’ attack lets hackers verify Visa card details
- What happens when a country cracks down on fake news? Ask China
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- TV of the year award 2016
- Best phone of the year 2016
- Google Daydream View VR full, in-depth review
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- FTSenior Visual DesignerNSW
- CCPMO Lead/ ManagerNSW
- TPSenior Software EngineerQLD
- CCProject Administrator-NSW
- FTService Desk Analyst / Security EngineerQLD
- CCUAT TesterQLD
- FTSoftware Implementation ConsultantVIC
- FTPositive Vetted ICT positions - Defence intelligence and information securityACT
- FTSenior Test EngineerNSW
- CCSystems Administrator :SCCMWA
- TP.NET Developer (Sitecore)QLD
- FTTraining & Implementation Manager, PlatformNSW
- FTWeb Developer/ DesignerVIC
- FTTechnology Portfolio - Investment AnalystACT
- CCSoftware TesterNSW
- CCSiebel Developers x 8NSW
- FTIndustry Engagement ManagerVIC
- FTSenior WebSphere Portal Technical LeadNSW
- CCAPI DeveloperVIC
- FT.Net DeveloperVIC
- CCBusiness Analyst - Finance - CBDNSW
- FTSOE Team LeaderWA
- CCWeb Services Tester- Test AnalystNSW
- FTEnterprise Account ManagerQLD
- CCSQL Data and Reporting AnalystNSW