If attackers intent on data theft can tap into an electrical socket near a computer or if they can draw a bead on the machine with a laser, they can steal whatever is being typed into it.
European laws governing the digitization of content such as books, movies and music need a major re-working in order to keep Europe relevant in the digital age, said the European Commissioner for the information society and telecoms Viviane Reding on...
France has created a new national IT systems security agency to better defend its IT networks.
The thriving world of botnet attacks continues to demand IT's attention.
U.S. government IT spending is projected to grow to US$90 billion in 2014, up from $76 billion in 2009, with cloud computing and cybersecurity being high-growth areas, according to Input, an analysis and consulting firm focused on government contract...
Microsoft today said it would deliver six security updates next Tuesday, including two for holes that hackers have been using for months to attack Windows and Internet Explorer (IE).
A claim of a software vulnerability in a program used to connect securely to servers across the Internet is likely a hoax, according to an analyst with the SANS Internet Storm Center.
The critical bug that Microsoft confirmed Monday but has yet to patch is a prime candidate for another Conficker-scale attack, a security researcher said.
Google, while announcing its new Chrome operating system late Tuesday, said users would no longer have to worry about viruses, malware and security updates, but security experts disagreed on whether Google can deliver on those promises.
There's nothing in the code of the malware used since Saturday to attack a wide array of U.S. and South Korean government and high-profile Web sites that indicates the campaign is backed by the government of North Korea, a noted botnet researcher sai...
A botnet comprised of about 50,000 infected computers has been waging a war against U.S. government Web sites and causing headaches for businesses in the U.S. and South Korea.
The vulnerability that sent Microsoft scrambling yesterday and is being used by hackers now to attack Internet Explorer (IE) users may have been reported 18 months ago or more.
A Virginia software developer has pleaded guilty to charges related to creating and marketing software designed to send bulk commercial e-mail messages, in violation of the U.S. CAN-SPAM Act, the U.S. Department of Justice said.
Beijing's Internet clampdown appears to have succeeded in shutting out dissenting views over deadly riots in western China that claimed at least 156 lives.
For the second time in six weeks, Microsoft today confirmed that hackers are exploiting an unpatched bug in DirectX, this time by attacking Internet Explorer (IE).
Most Popular Reviews
- 1 2016 Ford Mustang EcoBoost review
- 2 Synology DS216+ Review
- 3 Review: TCL C1 series 4K TV
- 4 Sony 75-inch UHD TV (X9400C) review: Sony and Android are a winning duo
- 5 LG 55EG960T OLED UHD TV
Join the Good Gear Guide newsletter!
Best Deals on Good Gear Guide
Latest News Articles
- Edward Snowden has developed an iPhone case meant to kill surveillance
- No more passwords with Google's Trust API
- A critical flaw in Symantec antivirus engine puts computers at risk of easy hacking
- Malware attacks on two banks have links with 2014 Sony Pictures hack
- Valve cleverly battles Steam cheaters with two-factor authentication
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTSocial Media AssistantQLD
- CCSenior Tester - Automation / Telecommunications (Urgent)NSW
- CCContract Analyst Programmer (JAVA/SQL) 160810/AP/662Asia
- FTFull Stack DeveloperNSW
- FTGraduate IT supportNSW
- CCVendor ManagerVIC
- CCSenior Change ManagerVIC
- CCProject ManagerACT
- CC.Net DeveloperNSW
- CCUX / UI Visual DesignerNSW
- FTEmbedded Software EngineerWA
- CCNetwork ArchitectNSW
- FTSharePoint DeveloperSA
- CCProject Manager, Credit CardsNSW
- CCJava DeveloperQLD
- FTSAP FS-PM/FS-PQM SpecialistVIC
- CCBusiness AnalystQLD
- CCChange Analysts - multiple rolesNSW
- FTInfrastructure Technology Platform ManagerVIC
- FTNetwork Infrastructure SpecialistSA
- CCServiceNow Technical LeadNSW
- CCPractice Lead - Java, FrontendVIC
- FTDefence Network EngineerACT
- CCCRM Technical Consultant / DeveloperNSW
- FTChange ManagerNSW