security

security

News

  • Botnets: Size isn't everything, says new report

    Published figures estimating the size and scope of botnets are often inaccurate and do not reflect the threat these compromised networks pose to security, according to research released this week by ENISA, the European Network and Information Securit...

  • 9 Security Tips for Protecting Mobile Workers

    The new working professional is always connected, and increasingly, the office is Starbucks, an airport, or home. With new flexibility comes new IT security risks for businesses. Basic defenses like antivirus are important, but not enough to keep cor...

  • Travel security in the Middle East and North Africa

    Many of us watch the events in the Middle East and North Africa unfold from afar. But for businesses with operations in these global regions of political unrest, protests, rebel uprising and deteriorating security often force difficult and immediate ...

  • 4 reasons why Facebook and vanity don't mix

    My colleague, Bill Brenner, has a t-shirt he likes to wear that basically says social networking feeds the darker sides of human nature. The shirt is a parody of a Venn Diagram and shows the relationship between sites like Facebook and Twitter to wha...

  • Abine releases do-not-track browser add-on

    A company that builds tools to give greater privacy online released a free browser extension on Tuesday that lets users selectively decide which websites they will allow to track them.

  • Is VOIP secure?

    USANomad asked the Answer Line forum if people can eavesdrop on Voice Over Internet Protocol (VOID) phone calls.

  • FTC officially closes Twitter security investigation

    The U.S. Federal Trade Commission has closed the book on its legal action against Twitter, stemming from <a href="http://www.pcworld.com/businesscenter/article/164182/hacker_i_broke_into_twitter.html">two 2009 hacking incidents</a> where high-profile...

  • With hacking, music can take control of your car

    About 300 years ago, the English playwright William Congreve wrote, "music has charms to soothe a savage breast, to soften rocks, or bend a knotted oak." This week we learned that it can also help hackers break into your car.

  • Five big security threats for 2011

    Online malicious activity was a major headache in 2010, and so far, 2011 is no different: We've seen scams and malware on Twitter, Facebook, and the Android Market, as well as a rise in politically motivated online attacks. But that's no surprise to ...

Most Popular Reviews

Follow Us

Best Deals on GoodGearGuide

Shopping.com

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Latest Jobs

Shopping.com

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?