The continuing saga of Google's wireless snooping and the maelstrom it's generated won't end anytime soon.
Whatever you use to surf the Web needs a fix. Developers of all five major browsers--Chrome, Firefox, Internet Explorer, Safari, and Opera--recently released important security patches.
Once upon a time, instant messaging was a consumer technology. That consumer toy worked its way into the corporate network and was eventually not just accepted, but embraced and leveraged as a valuable tool.
Last week a flawed DAT file from McAfee led to false positives crashing Windows XP systems and leading to a massive cleanup effort. It would be very easy to simply point the finger at McAfee, terminate the employment of a scapegoat security engineer ...
In 1993, Private Investigator Joe Seanor had wrapped up employment stints in the CIA and the Department of Justice, and was looking for something new in his professional life.
The last thing any of us need these days is another uninformed discourse on health care, but I tend to wade in where others have the common sense to keep out.
iPhones appear to pose greater security risks than Android, Blackberry and Nokia smart phones, but is this really the case? An nCircle survey says yes, security expert Charlie Miller says not necessarily, and Pwn2Own sponsor TippingPoint won't say.
So far 2010 hasn't been kind to the Microsoft Internet Explorer Web browser. It is only March, and Microsoft is releasing the second emergency out-of-band patch to respond to a zero-day exploit in the wild.
A security researcher has published exploit code for the latest Internet Explorer zero-day flaw on the Web and Microsoft is warning that more attacks against the unpatched vulnerability can be expected in-the-wild. One thing seems to be more apparent...
Cybercrime is becoming an ever increasing threat.
Lock down your PC.
Dear Facebook, I appreciate your service. I really do.
Kaspersky Lab may not be a household name in the United States, but in some parts of the world, it's the most popular consumer antivirus software. In China the company boasts 100 million users, and the software is also popular in Germany, and, of cou...
Do you know how to guard against scareware? How about Trojan horse text messages? Or social network data harvesting?
Rootkits, a type of stealth technology used by malware malefactors, attempt to hide in the dark corners of an infected PC and evade detection. A new post out today from the Microsoft Malware Protection Center shines the spotlight on the evil tools.
Most Popular Reviews
- 1 Witness a 241% Australian price hike: Dell Latitude 7370 review
- 2 Is this the best value phone on the market? Moto G4 Plus review
- 3 Sony Xperia X Performance review: Sony’s most disappointing product in years
- 4 Huawei P9 review: lifting photography to another level... sometimes.
- 5 Huawei Mate 8 review: probably the best all-round Android phone you can buy
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- How to stop hackers from reaching your deleted files
- WikiLeaks' methods questioned by whistleblower Edward Snowden
- Six quick steps to start a Digital Detox
- FBI said to investigate possible hack of another Democratic Party organization
- Telstra increases NBN market share
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTSocial Media AssistantQLD
- FTSenior Architect, Marketing and Campaign ManagementNSW
- CCServiceNow Technical LeadNSW
- CCAgile Performance Tester- Bamboo, Jenkins, Confluence, JiraNSW
- CCTechnical Specialist - EUCNSW
- CCBusiness AnalystQLD
- FTEmbedded Software EngineerWA
- CCDesktop Engineer (SCCM/SOE)WA
- CCStrategic Business AnalystNSW
- FTApplications Support / Systems Administrator | DefenceACT
- CCSAP Solution ArchitectACT
- FTPortal DeveloperNSW
- CCNetwork ArchitectNSW
- FTApplication Support AnalystSA
- CCReport Business Analyst- BI, Oracle, SAP, TableauNSW
- CCMessaging EngineerNSW
- FTSharePoint DeveloperSA
- FTOPEN_ASAP_Configuration ManagerACT
- CCData Analyst / Data ModelerNSW
- CCLead Business AnalystNSW
- FTSenior .Net Applications SupportACT
- FTSAS Support SpecialistNSW
- CCFull Stack Java DeveloperNSW
- CCEnvironment Support AnalystQLD
- CCInformatica DeveloperNSW