Adobe Systems Inc. Tuesday acknowledged that all versions of its popular PDF software, including editions for Windows, the Mac and Linux, contain at least one, and possibly two, critical vulnerabilities.
Facebook users were hit Wednesday with a phishing attack that tried to steal names and passwords from users of the popular social network.
Writing in the latest issue of Virus Bulletin (registration required), two Symantec researchers report what they believe is the first evidence of a major botnet consisting of compromised Macs.
Adobe Systems Inc. Tuesday confirmed that it's investigating reports that its popular PDF viewing software, Adobe Reader, contains a critical vulnerability.
Researchers are developing a software program that will correlate stock price movements with news story headlines as a way to detect insider trading.
A study from security vendor Qualys has found that companies are patching just a hair faster than they were five years ago.
Spammers have seized on the growing interest in news of a possible swine flu epidemic to hawk fake pharmaceuticals, security experts warned Monday.
A Dutch university has landed a European Research Council grant to continue work on a Unix-type operating system that aims to be more reliable and secure than Linux or Microsoft Windows.
The evolution of the multi-faceted Conficker worm is expected to take another turn this May 5th when the latest version, Conficker.E, will simply self-destruct on infected machines, say a number of security researchers.
Mainstream media hype leading up to the Conficker worm's April 1 software update may have distracted people from legitimate cyber threats, the U.S. Federal Bureau of Investigation's head of cyber security said Thursday.
A Vietnamese security company has detected what it believes is a new worm that thwarts Google's security protections in order to register new dummy Gmail accounts from which to send spam.
One of the largest botnets ever to be discovered has infected 1.9 million computers around the world, including corporate and government machines, according to a security firm.
Computer fraud may be a big problem for banks today, but the telephone is becoming a critical tool for fraudsters, bank executives say.
Attackers, probably based in China, are exploiting a December bug in Microsoft Word to hijack Windows PCs, Vietnamese security researchers warned Thursday.
Hackers can successfully attack Windows PCs months -- even years -- after Microsoft Corp. fixes a flaw, a security expert said Thursday, because there's always a pool of unpatched systems.
Latest News Articles
- Microsoft's Chinese partner confident Xbox can compete against Android consoles
- Sony launches 6in dual-SIM smartphone for sub-$500
- Ukraine tensions could hurt international security efforts, Kaspersky says
- See ya, Microsoft: Intel looks to Android for growth in tablets
- Rushed Heartbleed fixes may expose users to new attacks
Most Popular Articles
- 1 Tethering tutorial: How to use your iPhone as a modem
- 2 Buying guide: Ovens, cooktops and freestanding cookers (upright ranges)
- 3 The most disturbing YouTube videos of all time
- 4 Aldi's new budget Android smartphone isn't very good value
- 5 Who makes the better smartphone, Samsung or HTC?
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.