Trend Micro’s consumer security product manager has recommend people not to buy antivirus products, including his own. But there is a method to his madness, he assures.
The infamous Gpcode 'ransomware' virus that hit computers in July was the work of a single person who is known to the authorities, a source close to the hunt for the attacker has told Techworld.
After shelving plans to detail a browser clickjacking vulnerability that is indirectly related to Adobe Systems' products at the company's request earlier this month, a security researcher plans to detail the flaw next month.
Last week, a pair of security researchers spread the news that a new class of vulnerabilities, called "clickjacking," puts users of every major browser at risk from possible attack.
Mozilla beat its own schedule by patching Firefox late Friday to fix a password bug it had inadvertently introduced earlier in the week.
Microsoft and Washington state are cracking down on scammers who bombard computer users with fake warning messages in hopes of selling them useless software.
IBM last week offered a sneak peek at what it says will address security issues in the virtualization world by early next year.
A Trojan horse program now available to a growing number of fraudsters can add data entry fields to legitimate online banking sites and entice consumers to give up sensitive information such as bank card numbers and PINs (personal identification numb...
Security researchers have warned that a new class of vulnerabilities dubbed "clickjacking" puts users of every major browser at risk from attack.
Mozilla developers are rushing out a new release of their Firefox browser to fix a bug that has been preventing some Web surfers from using saved passwords this week.
Neosploit, the notorious hacker exploit kit that some thought had been retired months ago, has not only returned from the dead, but is responsible for a dramatic increase in attacks, a security researcher claimed Thursday.
Apple's patching process proves that the company isn't serious about moving Macs into the enterprise, security researchers said Monday.
Adobe Systems last week said it will soon quash a bug in Flash that has been used for more than a month by attackers to poison Mac and Windows users' clipboards with URLs to malicious sites.
Open source developer NeoPwn has built what it claims is the first Wi-Fi penetration testing platform to run from a mobile phone.
A US state legislator has confirmed that his son, a 20-year-old student at the University of Tennessee, is the person being named on blogs and message boards in connection with the hacking of Sarah Palin's e-mail account, a Nashville paper reported.
Most Popular Reviews
- 1 Motorola Moto X (2nd Gen) review: Raising the bar
- 2 Xiaomi Mi4 review: Xiaomi's best yet
- 3 Samsung Galaxy Note Edge review: Lightly flawed, Undeniably special
- 4 Sony Xperia Z3 review: The no-frills flagship
- 5 Samsung's Galaxy Alpha review: A peek into the Galaxy S6
Best Deals on GoodGearGuide
Latest News Articles
- Verizon to allow opt-out from mobile 'supercookies'
- AT&T will pay $18.2B as top bidder in mobile spectrum auction
- BMW cars found vulnerable in Connected Drive hack
- Twitter's Vine Kids app is not just for kids
- Google Glass holds promise but requires a 'reset'
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.