An all-in-one security suite that puts a focus on parental features and safe social networking
Dropcam Echo review: A live streaming camera and app that are easy to set up and access
Avira AntiVir Personal review: Great malware protection
BitDefender Antivirus Pro 2011 offers good detection of known malware
Avast Free Antivirus 5 review: This free antivirus package offers quick scan speeds
security in pictures
As cybercriminals employ increasingly sophisticated tactics to steal identities and data, and the costs and consequences of data breaches skyrocket, here are seven steps that your small business should be taking to insulate themselves from cyberattacks.
Learn how to protect yourself in the Cloud from the next vulnerability and/or wide scale attack.
From unmanned aircraft swarms to space systems, drones are hot.
The experts weigh in on their top picks for protecting enterprise networks.
WikiLeaks has released more than 8,700 documents it says come from the CIA's Center for Cyber Intelligence, with the documents saying the agency had 24 "weaponized" zero-day exploits for the Android operating system as of 2016.
More than 130 Android apps containing some malicious coding managed to infiltrate the Google Play store, possibly because the developers’ tools that built them were tainted, according to security researchers.
Did a toymaker ignore warnings about a data breach? That’s a key question swirling around Spiral Toys, a company behind a line of smart stuffed animals that security researchers worry can be easily hacked.
Google is asking developers to take over its effort to make end-to-end email encryption more user friendly, raising questions over whether it’ll ever become an official feature in the company’s products.
Australian Privacy Commissioner Timothy Pilgrim will not appeal a Federal Court decision that confirmed a ruling by the Administrative Appeals Tribunal (AAT) limiting the ‘metadata’ Telstra is compelled to hand over to an individual if that individu...
FreeOTFE may sound like a political bumper sticker, but it stands for "Free On The Fly Encryption." The "Free" part is self-explanatory; "On The Fly Encryption" refers to the encrypting/decrypting of data as it is written to or read from your hard di...
Many reasons exist for why you might want or need to "security wipe" a BlackBerry, or completely erase all personal data stored on your handheld: You got a new smartphone and plan to retire the older device; you're trading in your existing BlackBerry...
Today is the final Microsoft Patch Tuesday for 2010. It has been a busy year for Microsoft when it comes to security bulletins, and December is no exception as Microsoft closes out the year with a record 17 security bulletins. With only a week or so ...
A security researcher today provided a way for users to see whether their e-mail addresses and passwords were among the 1.3 million compromised in a hack of Gawker Media's sites.
Despite the convenience, free public Wi-Fi networks like those found in hotels, Starbucks, and McDonald's are also a serious risk when it comes to your data and personal information.
Advanced Persistent Threats (APTs) are the plague of enterprise security, crippling businesses and IT careers through costly data breaches and massive losses. Their goal is to steal intellectual property, and confidential company information. They ro...
The FBI has issued a plea for those who have been hit by ransomware to report this to federal law enforcement so that the country can get a better sense of just how bad this problem really is.
What happens when you delete a file? Unknown to most, deleted data from a mobile phone can still be shared with others if not appropriately managed. In a worst-case scenario, this could end up in the hands of a hacker or e-criminal, and used against ...
In today’s day and age we see a huge amount of excitement around finding the biggest and best presents for kids. Not only this, children are encouraged to surf the web and use mobile apps from a young age. We are seeing toddlers trading toy cars and ...
As tech companies increasingly rely on analyzing and selling user data to boost revenue, trust is emerging as one of the defining issues of the year for the IT sector.
Whitepapers about security
A data security breach is every organisation’s worst nightmare. It impacts the relationship with your employees, erodes the trust with your customers and threatens your organisation’s reputation
Videos about security
Epson WorkForce ET-4550
Microsoft L5V-00027 Sculpt Ergonomic Keyboard Desktop
UE Boom 2 Bluetooth speaker
Smart LED Bulb LB130
Samsung portable 1TB T3 drive
Linksys AC5400 MU-MIMO Gigabit router
Lexar® JumpDrive® S57 USB 3.0 flash drive
Everki ContemPRO Roll Top Laptop Backpack
Epson EcoTank Expression ET-2500
Huawei Mate 9
Lexar® JumpDrive® S45 USB 3.0 flash drive
Belkin MIXIT Metallic Lightning to USB Cable
Google Daydream VR headset
3SIXT Ultra HD Sports Action Camera
Logitech G403 Prodigy mouse
Epson WorkForce DS-360W
Acer Swift 7
Lexar® Portable SSD
Audio-Technica ATH-ANC70 Noise Cancelling Headphones
Dell Inspiron 5000 series 2-in-1
HD Pan/Tilt Wi-Fi Camera with Night Vision NC450
Surface Pro 4
Lexar® Professional 1800x microSDHC™/microSDXC™ UHS-II cards
Garmin Fenix Chronos smartwatch
Dell XPS 13 laptop
HP Pavilion x360 13”
Lexar® JumpDrive® C20c USB Type-C flash drive
Blade 28 backpack by Arc’teryx
Most Popular Reviews
- 1 Gigabyte Aorus GA-AX370-Gaming 5 AMD Ryzen AM4 motherboard review
- 2 Kogan curved 4K UHD 55-inch LED LCD TV review
- 3 Panasonic Blu-ray recorder PVR set-top box review
- 4 Garmin Fenix Chronos fitness tracker smartwatch review
- 5 Star Wars Death Star Bluetooth levitating rotating speaker review
Join the Good Gear Guide newsletter!
Latest News Articles
- Asus' popular 144Hz gaming monitor has dropped to $205
- Intel Optane Memory has a mission: Make hard drives faster than SSDs
- 10 powerful, obscure Windows keyboard shortcuts you should know
- Microsoft's Docs.com is sharing dangerously sensitive personal files and information
- Meet PC Building Simulator, a DIY teaching tool that could be the novice's best friend
PCW Evaluation Team
A smarter way to print for busy small business owners, combining speedy printing with scanning and copying, making it easier to produce high quality documents and images at a touch of a button.
I've had a multifunction printer in the office going on 10 years now. It was a neat bit of kit back in the day -- print, copy, scan, fax -- when printing over WiFi felt a bit like magic. It’s seen better days though and an upgrade’s well overdue. This HP OfficeJet Pro 8730 looks like it ticks all the same boxes: print, copy, scan, and fax. (Really? Does anyone fax anything any more? I guess it's good to know the facility’s there, just in case.) Printing over WiFi is more-or- less standard these days.
As a freelance writer who is always on the go, I like my technology to be both efficient and effective so I can do my job well. The HP OfficeJet Pro 8730 Inkjet Printer ticks all the boxes in terms of form factor, performance and user interface.
I’d happily recommend this touchscreen laptop and Windows 10 as a great way to get serious work done at a desk or on the road.
Ultimately, I think the Windows 10 environment is excellent for me as it caters for so many different uses. The inclusion of the Xbox app is also great for when you need some downtime too!
For me, the Xbox Play Anywhere is a great new feature as it allows you to play your current Xbox games with higher resolutions and better graphics without forking out extra cash for another copy. Although available titles are still scarce, but I’m sure it will grow in time.
- LG G6: unboxing, hands on review and detail shots
- Samsung Galaxy A5 2017: unboxing, hands on review and detail shots
- Behind the scenes with Team Walkinshaw at V8 Supercars Melbourne 2017
- Which flagship TV is best? Sony 4K HDR Bravia 2016 versus LG 4K HDR OLED 2016
- 10 Blu-ray movies / Best looking Blu-ray movies
- FTSocial Media ExecutiveNSW
- FTLevel 2 Technical Support OfficerQLD
- FTPeoplesoft Functional Consultant - Campus SolutionsNSW
- FTSenior Test AnalystSA
- FTSenior BANSW
- FTSolutions Architects - 10 roles availableACT
- FTDatabase DeveloperVIC
- FT.Net Solutions DeveloperSA
- FTHadoop Service AdministratorNSW
- CCTechnical Business AnalystVIC
- FTSAP HR Functional ConsultantQLD
- CCOracle WebLogic AdministratorNSW
- CCFullstack .Net DeveloperNSW
- FTArcFM DeveloperNSW
- FTProject CoordinatorVIC
- FTData Analyst LeadSA
- TPBI Report Developer - SSRS SSIS SSASNSW
- FTLevel 3 Application Support AnalystVIC
- TPBusiness Change ManagerQLD
- CCMicrostrategy DeveloperVIC
- FTProject Coordinator/AdministratorNSW
- CCFrom Security Operations to Technical Business Analyst, make the move now!NSW
- CCVMWare Automation ArchitectACT
- FTJunior-Mid Level Implementation CoordinatorQLD
- FTSenior .Net DeveloperVIC