Authorities in South Korea are probing a large system failure at a popular bank, trying to determine whether the incident was an error or a cybercrime that could be repeated elsewhere in the country where business leans largely on electronic transact...
When Google admitted last year that it had been targeted by sophisticated hackers, possibly from China, it introduced a new term into the high technology lexicon -- the advanced persistent threat. These attacks are sophisticated, targeted, and almost...
A DIY guide to securing Android-based devices
The European Union's data retention law has come under scrutiny, with a new report saying that it poses significant risks to individuals' right to privacy.
One day after a hacker posted screen shots and data to a hacking mailing list, saying he had broken into a New Mexico wind turbine facility, the company that runs the turbines says it has seen no evidence of a computer intrusion.
Claiming revenge for an "illegitimate firing," someone has posted screenshots and other data, apparently showing that he was able to break a 200 megawat wind turbine system owned by NextEra Energy Resources, a subsidiary of Florida Power & Light.
Apple today patched bugs in iOS and Safari used at last month's Pwn2Own hacking contest by three teams of researchers who collectively earned $45,000 for their work.
Oracle plans to release a large number of security patches for its various software products next week, including six bug-fixes for its flagship database software.
Hackers have compromised several servers that support WordPress and may have obtained source code, according to the founding developer of Automattic, the company behind the popular blogging platform.
A local security expert is dumbfounded by the ease in which a fake <i>Twilight: Breaking Dawn</i> game application has spread across Facebook, and has warned Australians to be less trusting when it came to approving applications on the social network...
Apparently, NSS Labs struck a nerve. NSS Labs revealed that almost all of the firewalls it tested for a recent report are susceptible to crash or compromise using common attacks. The firewall vendors in question, though, beg to differ and take except...
Toshiba Wednesday unveiled its first family of self-encrypting hard disk drives (HDDs) that can also erase data when connected to an unknown host.
Organisations could dramatically cut their exposure to vulnerabilities in Microsoft software simply by limiting Windows admin rights.
Some of the most commonly-used firewalls are subject to a hacker exploit that lets an attacker trick a firewall and get into an internal network as a trusted IP connection.
One of the big advantages of using Linux is that its security tends to be so much better than that of the competing alternatives.
Most Popular Reviews
- 1 2016 Ford Mustang EcoBoost review
- 2 Review: TCL C1 series 4K TV
- 3 Sony 75-inch UHD TV (X9400C) review: Sony and Android are a winning duo
- 4 LG 55EG960T OLED UHD TV
- 5 Panasonic Viera UHD TV review: good hardware, fragmented software
Join the Good Gear Guide newsletter!
Best Deals on Good Gear Guide
Latest News Articles
- No more passwords with Google's Trust API
- A critical flaw in Symantec antivirus engine puts computers at risk of easy hacking
- Malware attacks on two banks have links with 2014 Sony Pictures hack
- Valve cleverly battles Steam cheaters with two-factor authentication
- New USB-C authentication spec protects against malware and shoddy chargers
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTUX DesignerVIC
- FTBusiness AnalystNSW
- CCSystems Trainer - Networking/ RadioVIC
- FTTechnical/Solutions ArchitectNSW
- CCContract System Analyst (Renewable Contract)Asia
- FTSolution Architect - Data/ InformationVIC
- CCContract Programmer (JAVA/J2EE/SQL) 160628/P/133Asia
- CCSharepoint ConsultantQLD
- CCChange ManagerNSW
- FTIT Service Desk AnalystNSW
- CCUX DesignersQLD
- CCSystems EngineerNSW
- CCBusiness Data AnalystNSW
- CCContract Analyst Programmer (J2EE/Oracle) 160704/AP/601Asia
- CCImplementation ManagerNSW
- FTNV2 Defence Project Manager | Canberra | Major exciting White Paper projectsACT
- CCPMO AnalystVIC
- CCSystems Engineer / Applications Scripting DeveloperSA
- CCMidrange Technical ArchitectQLD
- CCSenior Project Delivery ManagerACT
- CCProject ManagerNSW
- CCProject Manager - IT SecurityNSW
- FTSenior Java Developer (Java/Maven/AEM)NSW
- FTIT Support Analyst (Renewal Contract)Asia
- CCSenior Performance & Automation EngineerNSW