For the second time in a week, Microsoft is warning users that hackers are exploiting an unpatched, critical bug in a company-made ActiveX control, putting people running Internet Explorer (IE) at risk.
Tanzania has joined a group of African countries using mobile phone SIM card registrations to both track down criminals using mobile phones to commit crimes and to reduce handset theft.
The number of botnets and of computers controlled by them in China has fallen in recent years, though the country remains a top host for the networks of compromised computers, according to the government and independent researchers.
The cyberattacks that took down prominent U.S. and South Korean Web sites in the last week have apparently ended but the search for those responsible is only just beginning. North Korea has emerged as a likely culprit, especially among politicians, b...
Twitter is suspending the accounts of some users whose computers have fallen victim to a well-known piece of malicious software that has targeted other sites such as Facebook and MySpace.
MasterCard today clarified a June 15 bulletin about the use of remote key injection (RKI) services for upgrading encryption protocols on merchants' point of sale (POS) terminals, saying it was not an edict.
If attackers intent on data theft can tap into an electrical socket near a computer or if they can draw a bead on the machine with a laser, they can steal whatever is being typed into it.
European laws governing the digitization of content such as books, movies and music need a major re-working in order to keep Europe relevant in the digital age, said the European Commissioner for the information society and telecoms Viviane Reding on...
France has created a new national IT systems security agency to better defend its IT networks.
The thriving world of botnet attacks continues to demand IT's attention.
U.S. government IT spending is projected to grow to US$90 billion in 2014, up from $76 billion in 2009, with cloud computing and cybersecurity being high-growth areas, according to Input, an analysis and consulting firm focused on government contract...
Microsoft today said it would deliver six security updates next Tuesday, including two for holes that hackers have been using for months to attack Windows and Internet Explorer (IE).
A claim of a software vulnerability in a program used to connect securely to servers across the Internet is likely a hoax, according to an analyst with the SANS Internet Storm Center.
The critical bug that Microsoft confirmed Monday but has yet to patch is a prime candidate for another Conficker-scale attack, a security researcher said.
Google, while announcing its new Chrome operating system late Tuesday, said users would no longer have to worry about viruses, malware and security updates, but security experts disagreed on whether Google can deliver on those promises.
Most Popular Reviews
- 1 Evapolar USB air conditioner review
- 2 Hisense Series 7 ULED 4K UHD TV review
- 3 LED Lenser P7R Professional Torch review
- 4 Aftershokz Wireless Trekz Titanium Bone Conduction Bluetooth Headphones review
- 5 Review: Periscope users rejoice with Feiyu’s G4 Plus 3-Axis Gimbal for Smartphone video
Join the Good Gear Guide newsletter!
Latest News Articles
- Largest DDoS attack ever delivered by botnet of hijacked IoT devices
- Hackers have a treasure trove of data with the Yahoo breach
- FBI faces lawsuit because it's stayed mum on iPhone 5c hack
- The FBI could have saved money with this iPhone 5c hack
- Thousands of Seagate NAS boxes host cryptocurrency mining malware
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCVideo Conference Support Officer- VoIP, LAN, WAN, RemedyNSW
- CCSolutions ArchitectACT
- FTLinux Systems AdministratorNZ
- FTOutbound TelesalesVIC
- FTBusiness Development Manager | ICT intelligent systems integrationVIC
- CCNetwork and Security EngineerNSW
- CCSolution ArchitectQLD
- CCDigital Solutions ManagerNSW
- CCSenior Business Analyst -Change and SAP ProcurementNSW
- FTTest Manager (HP Quality Centre / ARIBA)NSW
- FTIT Pre-Sales EngineerSA
- CCBI Reporting AnalystACT
- CCLAN ConsultantWA
- FTNetwork and Security Design EngineerNSW
- FTDesktop/Application SupportVIC
- FTMDM EngineerNSW
- CCService Desk analystSA
- FTAndroid DeveloperNSW
- CCIT Security ArchitectACT
- CCSenior Project ManagerACT
- CCSoftware TesterACT
- FTCustomer Solutions Engineer | Voice | Data | TelcoNSW
- FTTeam Leader Full Stack, Python, FinanceNSW
- FTTechnical Business Analyst | Marketing ServicesNSW
- FTScrum Master | High Profile FintechNSW