For the second time in a week, Microsoft is warning users that hackers are exploiting an unpatched, critical bug in a company-made ActiveX control, putting people running Internet Explorer (IE) at risk.
Tanzania has joined a group of African countries using mobile phone SIM card registrations to both track down criminals using mobile phones to commit crimes and to reduce handset theft.
The number of botnets and of computers controlled by them in China has fallen in recent years, though the country remains a top host for the networks of compromised computers, according to the government and independent researchers.
The cyberattacks that took down prominent U.S. and South Korean Web sites in the last week have apparently ended but the search for those responsible is only just beginning. North Korea has emerged as a likely culprit, especially among politicians, b...
Twitter is suspending the accounts of some users whose computers have fallen victim to a well-known piece of malicious software that has targeted other sites such as Facebook and MySpace.
MasterCard today clarified a June 15 bulletin about the use of remote key injection (RKI) services for upgrading encryption protocols on merchants' point of sale (POS) terminals, saying it was not an edict.
If attackers intent on data theft can tap into an electrical socket near a computer or if they can draw a bead on the machine with a laser, they can steal whatever is being typed into it.
European laws governing the digitization of content such as books, movies and music need a major re-working in order to keep Europe relevant in the digital age, said the European Commissioner for the information society and telecoms Viviane Reding on...
France has created a new national IT systems security agency to better defend its IT networks.
The thriving world of botnet attacks continues to demand IT's attention.
U.S. government IT spending is projected to grow to US$90 billion in 2014, up from $76 billion in 2009, with cloud computing and cybersecurity being high-growth areas, according to Input, an analysis and consulting firm focused on government contract...
Microsoft today said it would deliver six security updates next Tuesday, including two for holes that hackers have been using for months to attack Windows and Internet Explorer (IE).
A claim of a software vulnerability in a program used to connect securely to servers across the Internet is likely a hoax, according to an analyst with the SANS Internet Storm Center.
The critical bug that Microsoft confirmed Monday but has yet to patch is a prime candidate for another Conficker-scale attack, a security researcher said.
Google, while announcing its new Chrome operating system late Tuesday, said users would no longer have to worry about viruses, malware and security updates, but security experts disagreed on whether Google can deliver on those promises.
Most Popular Reviews
- 1 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 2 Mazda MX-5 (2016) review: Absolute driving purity
- 3 Sony 75-inch UHD TV (X9400C) review: Sony and Android are a winning duo
- 4 LG 55EG960T OLED UHD TV
- 5 Panasonic Viera UHD TV review: good hardware, fragmented software
Join the Good Gear Guide newsletter!
Best Deals on Good Gear Guide
Latest News Articles
- Cyber criminals hack Netflix: Symantec
- BlackBerry’s PRIV hits Australian shores
- LG patches data theft bug affecting millions of Android phones
- Asacub is mobile banking’s new adversary: Kaspersky Lab
- Kaspersky Lab partners with WISeKey for wearable security
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTDigital Marketing Specialist | Media BuyerNSW
- CCInformatica ExpertNSW
- CCSolution Architect - .NET environmentACT
- FTJava or Ruby Web DeveloperVIC
- FTProject Manager / Scrum MasterNSW
- CC.NET DeveloperNSW
- CCSystem AdminVIC
- CCInformation Security ManagerNSW
- CC.NET DeveloperACT
- CCProject SchedulerVIC
- FTManager, Portfolio GovernanceNSW
- CCEXCEL Guru / Data AdministratorNSW
- CCJava DeveloperVIC
- CCSenior Network EngineersACT
- CCSAP CRM Specialist- ABAPACT
- CCOracle Developer - 3 month contractSA
- FTProject Manager | Permanent position | NV1 NV2 cleared | Defence | Great cultureACT
- CCProject ManagerSA
- CCOracle Business Analyst / TrainerSA
- CCSolutions ArchitectNSW
- CCSharePoint Web DeveloperACT
- CCJava Development Contract - MelbourneVIC
- FTSenior Front End Developer Required Working World Leading Digital TeamVIC
- FTManual Software TesterNSW
- FTBusiness Intelligence AnalystVIC