Trend Micro’s consumer security product manager has recommend people not to buy antivirus products, including his own. But there is a method to his madness, he assures.
The infamous Gpcode 'ransomware' virus that hit computers in July was the work of a single person who is known to the authorities, a source close to the hunt for the attacker has told Techworld.
After shelving plans to detail a browser clickjacking vulnerability that is indirectly related to Adobe Systems' products at the company's request earlier this month, a security researcher plans to detail the flaw next month.
Last week, a pair of security researchers spread the news that a new class of vulnerabilities, called "clickjacking," puts users of every major browser at risk from possible attack.
Mozilla beat its own schedule by patching Firefox late Friday to fix a password bug it had inadvertently introduced earlier in the week.
Microsoft and Washington state are cracking down on scammers who bombard computer users with fake warning messages in hopes of selling them useless software.
IBM last week offered a sneak peek at what it says will address security issues in the virtualization world by early next year.
A Trojan horse program now available to a growing number of fraudsters can add data entry fields to legitimate online banking sites and entice consumers to give up sensitive information such as bank card numbers and PINs (personal identification numb...
Security researchers have warned that a new class of vulnerabilities dubbed "clickjacking" puts users of every major browser at risk from attack.
Mozilla developers are rushing out a new release of their Firefox browser to fix a bug that has been preventing some Web surfers from using saved passwords this week.
Neosploit, the notorious hacker exploit kit that some thought had been retired months ago, has not only returned from the dead, but is responsible for a dramatic increase in attacks, a security researcher claimed Thursday.
Apple's patching process proves that the company isn't serious about moving Macs into the enterprise, security researchers said Monday.
Adobe Systems last week said it will soon quash a bug in Flash that has been used for more than a month by attackers to poison Mac and Windows users' clipboards with URLs to malicious sites.
Open source developer NeoPwn has built what it claims is the first Wi-Fi penetration testing platform to run from a mobile phone.
A US state legislator has confirmed that his son, a 20-year-old student at the University of Tennessee, is the person being named on blogs and message boards in connection with the hacking of Sarah Palin's e-mail account, a Nashville paper reported.
Most Popular Reviews
- 1 2016 Ford Mustang EcoBoost review
- 2 Review: TCL C1 series 4K TV
- 3 Tech21 Evo Xplorer iPhone case review
- 4 LG 55EG960T OLED UHD TV
- 5 Microsoft Lumia 640 review: Honouring Nokia's legacy
Join the Good Gear Guide newsletter!
Latest News Articles
- Apple warned of phishing attack threat to iPhone, iPad and Mac OS developers
- Cellcrypt releases voice encryption app for Android
- Sony hit again with two hacks
- No Rapture: the end has been delayed but watch out for apocalypse attacks
- Adobe Flash update puts users in charge of privacy
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCSenior IT Project SpecialistVIC
- CCData ModellerACT
- CCContract Analyst Programmer (.NET/SQL Server) 160829/AP/267Asia
- FTSenior Full Stack .Net DeveloperVIC
- CCTechnical Business Analyst- BABOK,Infrastructure, Banking bkgndNSW
- CCICT Security Design & Implementation - NV1ACT
- FTSenior IoT / M2M .Net DeveloperVIC
- FTTandem/NonStop Technical ConsultantWA
- CCContract Junior Programmer (JAVA/J2EE/SQL) 160902/JP/709Asia
- CCDB2 Database AdministratorACT
- CCSystems Analyst (IT Security/Network & Systems) 160826/SA/652Asia
- CCIT Support Officer- SAP (tool experience)NSW
- CCContract Programmer (JAVA/J2EE) 160901/P/601Asia
- CCChange AnalystVIC
- CCSAP HCM / HR -Sr. Business AnalystNSW
- FTWeb Analytics SpecialistNSW
- CCContract Systems Analyst (Cognos/JAVA/J2EE) 160831/SA/122Asia
- CCNetwork Technology SpecialistVIC
- CCSenior Integration Specialist - IP NetworkVIC
- CCChange Manager/ Advisor- operational environmentNSW
- CCService Desk AnalystNSW
- CCNetwork Implementation EngineerNSW
- CCChange AnalystNSW
- CCDevOps Engineer - Php, LAMP, XML, scripting, JavaNSW
- CCAnalyst Programmer/Snr. Analyst Programmer 20160817/vedAsia