Security

Did e-mail and the Internet kill the 9-5 workday?

Have you checked your work e-mailtoday? If you're like most employees in the United States and United Kingdom, the answer is yes despite the fact that it is not only the weekend, but an extended holiday weekend for most workers in the US. A day off i...

Mobile apps security: Apple iOS v. Google Android

The Apple iOS, which runs on its iPhone, iPod Touch, and iPad, has a flaw in how it reads PDF documents that makes it easier to hack. This flaw is exploited by JailbreakMe, a one-click site that makes it easy for anyone without any real tech skills t...

A Defcon badge unlike anything you have ever seen

It's unlike any conference badge you've seen before. Sleek, stylish, programmable, and made out of metal. It's the Defcon 18 conference badge. Unveiled at the annual hacker conference in Las Vegas, here's a first look at this year's badge.

What would it take to unseat Conroy?

It's safe to say that Senator Stephen Conroy, the federal communications minister, has upset a lot of people in the IT community with his push for mandatory Internet filtering. Although it may seem remote, the thought of him being unseated at the upc...

Wi-Fi WPA2 vulnerability FAQ

So this guy at AirTight Networks says Wi-Fi Protected Access 2 has a "hard shell on the outside, but a soft underbelly inside"due to an overlooked vulnerability, and an attacker can decrypt traffic that's been encrypted with WPA2. Is this total panic...

The pros and cons of Windows 7 security

Businesses are eyeing a transition to Microsoft Windows 7, and with a wealth of security features that are part of it, it's worth figuring out the good and bad about each of them, says Gartner analyst Neil MacDonald, who notes in some cases, third-pa...

Biggest tech industry apologies of 2010 - so far

While apologies from BP to the world regarding its environmental disaster and even from a U.S. Congressman to BP have stolen headlines of late, the tech industry has not been without its fair share of apologies during the first half of 2010 either.

Cross-site scripting: An old problem returns

In May, Web security consultant George Deglin discovered a cross-site scripting (XSS) exploit that involved Facebook's controversial Instant Personalization feature. The exploit ran on Yelp, one of the three sites that Facebook had selected to test I...

Most Popular Reviews

Follow Us

Best Deals on GoodGearGuide

Shopping.com

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?