System administrators overseeing Microsoft Exchange deployments should take a close look at Microsoft's latest round of security patches. In addition to covering Windows and Internet Explorer, Microsoft's latest monthly batch of patches covers the wi...
In a bid to give IT departments better control over devices that employees bring to work, ForeScout Technologies has added MobileIron to the list of mobile management vendors its network access control platform can be integrated with.
With 70 per cent of employees across corporate networks using a personal smartphone or tablet, growing attack surface too big to ignore
McAfee is enhancing its business security platform by adding near real-time querying capabilities to its ePolicy Orchestrator software and by integrating it with its security information and event management (SIEM) product to automatically initiate e...
Surprise! Bad guys are getting creative
Two U.S. lawmakers plan to reintroduce a controversial cybersecurity bill that allows private companies to share customers' personal information related to a wide range of cyberthreats with government agencies.
A new website has revealed that European Parliamentarians are bowing to pressure from U.S. companies to water down parts of a new data protection law.
One week after launching a security bug bounty program, the new file-storage and sharing service Mega claims to have fixed seven vulnerabilities, none of which met its highest severity classification.
A number of journalists covering Myanmar were warned by Google that their Gmail accounts had been targeted in "state-sponsored" attackers.
Security vendor Bit9 promised to release limited details of a hack caused by a failure of the company to install the same security software on its own network that it sells to a handful of Fortune 500 companies.
Oracle isn't done releasing patches for Java SE this month, as another batch will arrive Feb. 19, according to a company blog post.
A critical buffer overflow vulnerability patched this week in the widely used open-source cURL library (libcurl) has the potential to expose a large number of applications and systems to remote code execution attacks.
Financial malware authors are trying to evade new online banking security systems by returning to more traditional phishing-like credential stealing techniques, according to researchers from security firm Trusteer.
A new exploit kit called Whitehole has emerged on the underground market, providing cybercriminals with one more tool to infect computers with malware over the Web, security researchers from antivirus vendor Trend Micro reported Wednesday.
Facebook has deleted all European facial recognition data, the Irish data protection commissioner and a German data protection regulator confirmed independently Thursday after reviewing parts of the social network's source code.
Gadgets & Things
Most Popular Reviews
- 1 Finally! LG OLED TV 2016 range review
- 2 Huawei Nova Plus smartphone review
- 3 Apple iPhone 7 Plus review: including Portrait Mode
- 4 Google Daydream View VR full, in-depth review
- 5 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
Join the PC World newsletter!
Latest News Articles
- Raspberry Pi's new computer for industrial applications goes on sale
- Social networks let the rich buy influence
- 5G spectrum squatting case ends in $100M FCC fine
- Dash cam review: The Garmin Dash Cam 35 is a little bigger and better for the price
- Dash cam review: The Cobra CDR895D Drive HD offers affordable dual-channel video
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- The top 10 best and worst tech gadgets and products of 2016
- TV of the year award 2016
- Best phone of the year 2016
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- FTBrand Marketing Manager - Premium Entertainment BrandNSW
- CCLead DevOps Architect l AWS- Cloud- Linux- Puppet Ansible- JIRA-DatadogNSW
- FTJava DeveloperSA
- FTInfrastructure ConsultantQLD
- FTTechnical Account ManagerNSW
- TPWeb DeveloperSA
- FTSenior Drupal DeveloperNSW
- CCWebMethod DeveloperSA
- CCFIS Connex Developer (Brisbane Based)WA
- FTTechnical Account ManagerVIC
- CCTest Specialist - NetworkVIC
- FTSecurity Incident / SOC Analyst (Tier 1) - Permanent - North Ryde BasedNSW
- FTJunior Business Process Analyst Perm North SydneyNSW
- FTTechnical Account ManagerACT
- FTLevel 3 EngineerNSW
- FTSenior AEM Consultant - Public SectorACT
- FTFront End DeveloperNSW
- FTLinux EngineerNSW
- FTJava DeveloperNSW
- FTSenior Java DeveloperNSW
- CCApplication PackagerVIC
- CCSenior C++ Software EngineerQLD
- CCFIS Connex Developer (Brisbane Based)SA
- FTTechnical Consultant MS Dynamics AXVIC