Microsoft today delivered six security updates that patch nine vulnerabilities, fixing two bugs already being used by hackers but leaving one still open to exploit.
The number of teens illegally file-sharing has fallen since 2007, says Music Ally.
The U.K. was the likely source of a series of attacks last week that took down popular Web sites in the U.S. and South Korea, according to an analysis performed by a Vietnamese computer security analyst.
Microsoft confirmed another zero-day vulnerability on Monday in a set of software components that ship in a wide variety of the company's products.
For the second time in a week, Microsoft is warning users that hackers are exploiting an unpatched, critical bug in a company-made ActiveX control, putting people running Internet Explorer (IE) at risk.
Tanzania has joined a group of African countries using mobile phone SIM card registrations to both track down criminals using mobile phones to commit crimes and to reduce handset theft.
The number of botnets and of computers controlled by them in China has fallen in recent years, though the country remains a top host for the networks of compromised computers, according to the government and independent researchers.
The cyberattacks that took down prominent U.S. and South Korean Web sites in the last week have apparently ended but the search for those responsible is only just beginning. North Korea has emerged as a likely culprit, especially among politicians, b...
Twitter is suspending the accounts of some users whose computers have fallen victim to a well-known piece of malicious software that has targeted other sites such as Facebook and MySpace.
MasterCard today clarified a June 15 bulletin about the use of remote key injection (RKI) services for upgrading encryption protocols on merchants' point of sale (POS) terminals, saying it was not an edict.
If attackers intent on data theft can tap into an electrical socket near a computer or if they can draw a bead on the machine with a laser, they can steal whatever is being typed into it.
European laws governing the digitization of content such as books, movies and music need a major re-working in order to keep Europe relevant in the digital age, said the European Commissioner for the information society and telecoms Viviane Reding on...
France has created a new national IT systems security agency to better defend its IT networks.
The thriving world of botnet attacks continues to demand IT's attention.
U.S. government IT spending is projected to grow to US$90 billion in 2014, up from $76 billion in 2009, with cloud computing and cybersecurity being high-growth areas, according to Input, an analysis and consulting firm focused on government contract...
Most Popular Reviews
- 1 Review: TCL C1 series 4K TV
- 2 Mazda MX-5 (2016) review: Absolute driving purity
- 3 Sony 75-inch UHD TV (X9400C) review: Sony and Android are a winning duo
- 4 LG 55EG960T OLED UHD TV
- 5 Panasonic Viera UHD TV review: good hardware, fragmented software
Join the Good Gear Guide newsletter!
Best Deals on Good Gear Guide
Latest News Articles
- New USB-C authentication spec protects against malware and shoddy chargers
- Porn clicker runs rampant Google Play
- Old malware rears its ugly head in new attacks: ESET
- Cyber criminals hack Netflix: Symantec
- BlackBerry’s PRIV hits Australian shores
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCContract Analyst Programmer (JAVA/J2EE/SQL) 160505/AP/951Asia
- CCPMO Coordinator- Prince2, Project financialsNSW
- CCChange ManagerNSW
- CCData AnalystVIC
- CCOperational Team LeadVIC
- CCContract Systems Analyst (C++/JAVA/SQL) 160505/SA/971Asia
- FTSenior Project Manager, SoftwareNSW
- CCSystem Administration / Application Support | NV2 clearance neededACT
- CCServiceNow / SACM ConsultantNSW
- CCAEM DeveloperVIC
- FTSenior Revenue Systems Functional AnalystSA
- CCSenior Implementation AnalystNSW
- CCJava Developer (front end)WA
- CCAnalyst Programmer (JAVA/Windows Programming) 160428/AP/143Asia
- CCContract Programmer (JAVA/HTML/SQL) 160421/P/903Asia
- FTSenior Storage Systems EngineerACT
- FTMs Dynamics Nav Support Analyst- Level 1/2WA
- CCBusiness AnalystACT
- CCHealthcare Test SpecialistSA
- FTTechnical/Team Lead - .NetNSW
- CCSenior Financial Crime AnalystVIC
- CCMid or Senior Developer - Mobile Applications - (iOS)NSW
- CCSenior Technical WriterVIC
- CCMarketing Communications Specialist - Global IT CompanyNSW
- FTJunior Inside Sales Rep | National systems integrator & MSP | $60-70K+NSW