An all-in-one security suite that puts a focus on parental features and safe social networking
Dropcam Echo review: A live streaming camera and app that are easy to set up and access
Avira AntiVir Personal review: Great malware protection
BitDefender Antivirus Pro 2011 offers good detection of known malware
Avast Free Antivirus 5 review: This free antivirus package offers quick scan speeds
security in pictures
Don’t think email security is important? Here are six everyday scenarios where many businesses loosely send sensitive and confidential content and files over unsecure email.
From televisions to passenger planes, even the most unassuming device can, if accessed by the wrong people, be turned into something more sinister.
These disgruntled employees show what can happen when an employer wrongs them.
It's not just your boss or the government that's spying on you, it's also the devices and technologies you embrace.
A hacker group called the Syrian Electronic Army (SEA) scared visitors to several news websites on Thursday by posting rogue pop-up messages saying they'd been hacked.
Over 23,000 Web servers were infected with a backdoor called CryptoPHP that's bundled with pirated themes and plug-ins for popular content management systems.
Siemens released security updates for several of its SCADA (supervisory control and data acquisition) products for industrial environments, in order to fix critical vulnerabilities that may have been exploited in recent attacks.
Twitter, hungry for new data to fuel its targeted advertising, will start looking at what other apps its users have downloaded.
Cybercriminals are using malware designed to steal payment card information from point-of-sale systems to also infect ticket vending machines and electronic kiosks.
FreeOTFE may sound like a political bumper sticker, but it stands for "Free On The Fly Encryption." The "Free" part is self-explanatory; "On The Fly Encryption" refers to the encrypting/decrypting of data as it is written to or read from your hard di...
Many reasons exist for why you might want or need to "security wipe" a BlackBerry, or completely erase all personal data stored on your handheld: You got a new smartphone and plan to retire the older device; you're trading in your existing BlackBerry...
Today is the final Microsoft Patch Tuesday for 2010. It has been a busy year for Microsoft when it comes to security bulletins, and December is no exception as Microsoft closes out the year with a record 17 security bulletins. With only a week or so ...
A security researcher today provided a way for users to see whether their e-mail addresses and passwords were among the 1.3 million compromised in a hack of Gawker Media's sites.
Despite the convenience, free public Wi-Fi networks like those found in hotels, Starbucks, and McDonald's are also a serious risk when it comes to your data and personal information.
As tech companies increasingly rely on analyzing and selling user data to boost revenue, trust is emerging as one of the defining issues of the year for the IT sector.
After six months of contentious debate over U.S. National Security Agency surveillance programs, prompted by leaks from former government contractor Edward Snowden, the third week in December may have marked a major turning point.
Earlier in September, an update to the Google Settings app for Android tipped off that a remote device lock and password reset feature was on its way to the Android Device Manager. This week, the service finally went live for most users through the A...
Police in Austin, Texas, set up sting operations with cars they have under surveillance, watching for thieves to break into them. Marcus J. Carey's Web service, HoneyDocs -- born in the same city -- uses the same concept, only with computer files.
It's tough to keep track of all of your passwords. In spite of advances in biometrics, and increased attention on the value of two-factor authentication, passwords remain the primary means of digital security. They're also one of the weakest links in...
Whitepapers about security
A data security breach is every organisation’s worst nightmare. It impacts the relationship with your employees, erodes the trust with your customers and threatens your organisation’s reputation
Most Popular Reviews
- 1 Samsung's Galaxy Alpha review: A peek into the Galaxy S6
- 2 Samsung Galaxy Note 4 review: The busiest, biggest and best Samsung phablet
- 3 Aldi's $279 Bauhn Sphere review: Disappointing
- 4 Nokia Lumia 735 review: Perfectly ordinary
- 5 Bowers & Wilkins P5 (Series 2) review: For elegant sound
Best Deals on GoodGearGuide
Latest News Articles
- Syrian Electronic Army posts hacking message on several news sites
- Fastest LTE speed will be out of reach for most users
- EU net neutrality discussions to continue into the next year
- Over 23,000 Web servers infected with CryptoPHP backdoor
- Panasonic opens smart town targeting zero-emission houses
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCTech Support | IT Services Firm - Ad hoc Projects - Echuca AreaVIC
- FTMarketing Solutions ManagerNSW
- FTAccount ExecutiveNSW
- FTStudio Design ManagerVIC
- FTSEO Content ExecutiveVIC
- FTDigital Account ManagerNSW
- FTProgram Manager - Integration & SolutionsNSW
- CCTech Support | IT Services Firm - Ad hoc Projects - Port Augusta / Whyalla AreaSA
- CCStrategic Partner ManagerNSW
- FTPartnership Manager - MediaNSW