Kaspersky Lab may not be a household name in the United States, but in some parts of the world, it's the most popular consumer antivirus software. In China the company boasts 100 million users, and the software is also popular in Germany, and, of cou...
Do you know how to guard against scareware? How about Trojan horse text messages? Or social network data harvesting?
About two weeks after Google publicly squared off with the Chinese government, the world is still watching for the search company's next step.
If you think spam attacks were bad in 2009, just wait until 2010 gets going.
The Internet has loosened the control Chinese authorities hold over information in the country, but censorship there will remain strong despite Google's threat to leave China.
Rootkits, a type of stealth technology used by malware malefactors, attempt to hide in the dark corners of an infected PC and evade detection. A new post out today from the Microsoft Malware Protection Center shines the spotlight on the evil tools.
If you're concerned about the privacy implications of reading digital books, take a look at a nice guide put up yesterday by the Electronic Frontier Foundation.
Many organizations are embracing SOA as a way to increase application flexibility, make integration more manageable, lower development costs, and better align technology systems to business processes. The appeal of SOA is that it divides an organizat...
Facebook is tracking your every move on the site -- or so says one purported Facebook employee, according to an anonymous interview with the Rumpus. In the interview, the Facebook employee, whose identity was protected so she wouldn't lose her job fo...
2009 ushered in mobile malware with the first (and second) iPhone worm appearing just before Christmas.
Lost in the flurry of products announcements at last week's Consumer Electronics Show was Facebook CEO Mark Zuckerberg's suggestion on Friday that some aspects of privacy are a thing of the past. The Facebook founder's comments were part of an inter...
A decade after the Y2K crisis, date changes still pose technology problems, making some security software upgrades difficult and locking millions of bank ATM users out of their accounts.
A new administration in Washington this year was expected to herald sweeping changes on the national cybersecurity front.
Social engineering, the act of tricking people into giving up sensitive information, is nothing new. Convicted hacker Kevin Mitnick made a name for himself by cold-calling staffers at major U.S. companies and talking them into giving him information....
Facebook was built as a powerful social connector, allowing users to befriend others with similar interests, locations, schools, and more.
Most Popular Reviews
- 1 Evapolar USB air conditioner review
- 2 Hisense Series 7 ULED 4K UHD TV review
- 3 LED Lenser P7R Professional Torch review
- 4 Aftershokz Wireless Trekz Titanium Bone Conduction Bluetooth Headphones review
- 5 Review: Periscope users rejoice with Feiyu’s G4 Plus 3-Axis Gimbal for Smartphone video
Join the Good Gear Guide newsletter!
Latest News Articles
- Largest DDoS attack ever delivered by botnet of hijacked IoT devices
- Hackers have a treasure trove of data with the Yahoo breach
- FBI faces lawsuit because it's stayed mum on iPhone 5c hack
- The FBI could have saved money with this iPhone 5c hack
- Thousands of Seagate NAS boxes host cryptocurrency mining malware
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCSecurity Cleared IT Professionals - Expression of InterestSA
- FTInfrastructure Solutions ArchitectACT
- FTJava DeveloperNSW
- CCBusiness Analyst - Telecom ProjectNSW
- CCInformatica Developer (MDM)NSW
- CCSenior .NET DeveloperVIC
- CCIT Security ArchitectACT
- CCBusiness Analyst with change management experienceACT
- CCProgram Manager - Data InsightVIC
- FTTest Manager (HP Quality Centre / ARIBA)NSW
- CCSenior Change ManagerVIC
- FTScrum Master | High Profile FintechNSW
- CCSenior Project ManagerACT
- FTAndroid DeveloperNSW
- CCInfrastructure Project Manager - DCR ProjectNSW
- CCNetwork and Security EngineerNSW
- CCContract Junior Programmer (J2EE/SQL) 160927/JP/551Asia
- CCAcquisition Marketing Executive - B2BNSW
- CCSenior Business Analyst -Change and SAP ProcurementNSW
- CCTest Manager (HP Quality Centre / Kronos)NSW
- FTSenior Project Manager | TelecommunicationVIC
- FTNetApp Storage ConsultantWA
- CCService Desk analystSA
- FTOutbound TelesalesVIC
- FTTechnical Business Analyst | Marketing ServicesNSW