Cybercriminals stole debit card information from customers of dozens of financial institutions in a phishing campaign that combined rogue text messages and with VoIP calls.
The security researcher who identified an admin backdoor in a range of routers last year has found that Netgear's patches don't adequately address the security issue.
NEC has launched a biometric security program that uses face recognition to unlock access to PCs.
Web application attacks, cyber-espionage and point-of-sale intrusions were among the top IT security threats in 2013, according to Verizon's latest annual report on data breach investigations.
Security researchers have found that many satellite communication systems have vulnerabilities and design flaws that can let remote attackers intercept, manipulate, block and in some cases take full control of critical communications.
Cybercriminals have started using a sophisticated Android Trojan app designed for e-banking fraud to target Facebook users, possibly in an attempt to bypass the two-factor authentication protection on the social network.
Canadian police have arrested a 19-year-old man for allegedly using the Heartbleed bug to steal data about taxpayers.
It took just four days for German researchers to trick the Samsung Galaxy S5's fingerprint scanner into accepting a mold of a fingerprint instead of a real finger.
Home routers and other consumer embedded devices are plagued by basic vulnerabilities and can't be easily secured by non-technical users, which means they'll likely continue to be targeted in what has already become an increasing trend of mass attack...
Tesla Motors accounts are protected only by simple passwords, making it easy for hackers to potentially track and unlock cars, according to a security researcher.
The latest firmware in some Philips smart TV models opens an insecure Miracast wireless network, allowing potential attackers located in the signal range to control the TV remotely and perform unauthorized actions.
A new variant of the Gameover computer Trojan is targeting job seekers and recruiters by attempting to steal log-in credentials for Monster.com and CareerBuilder.com accounts.
At around €2,000 (US$2800) each, the secure smartphones that SecuSmart showed at Cebit last year were out of reach of many businesses -- although three governments have since bought them to secure mobile phone calls between senior officials, accordin...
The developers of Replicant, a mobile OS based on Android, claim to have found a backdoor vulnerability in a software component shipped with some Samsung Galaxy devices that potentially provides remote access to users' private files through the devic...
Recently released security updates for the popular Joomla content management system (CMS) address a SQL injection vulnerability that poses a high risk and can be exploited to extract information from the databases of Joomla-based sites.
Most Popular Reviews
- 1 Fetch TV Mighty review: Better than Foxtel
- 2 Fetch TV Mini review: Make your TV a smart TV
- 3 Parrot Mambo Drone review
- 4 Evapolar USB air conditioner review
- 5 Hisense Series 7 ULED 4K UHD TV review
Join the Good Gear Guide newsletter!
Latest News Articles
- Gallipoli is now an amazing video game
- Battlefield 1 review: Familiar multiplayer wedded to a brilliant WWI campaign
- Microsoft rescues disheveled lady Skypers with its TeleBeauty virtual makeup app
- Samsung releases super-high-capacity 8GB DRAM
- Mars lander goes silent, but scientists remain hopeful
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- Google Pixel XL full, in-depth smartphone review: The new best Android phone
- TV buying guide: What to look for when buying a TV in 2016
- Best iPhone 7 and iPhone 7 Plus plans: Optus vs Telstra vs Vodafone vs Virgin
- Which flagship TV is best? Sony 4K HDR Bravia 2016 versus LG 4K HDR OLED 2016
- 10 Blu-ray movies / Best looking Blu-ray movies
- CCSenior Project ManagerACT
- CCSAS DI DeveloperNSW
- CCNetwork AdministratorVIC
- FTProject Manager - FinanceNSW
- CCProject ManagerACT
- CCContract Analyst Programmer (IT Security) 161018/AP/383Asia
- CCProject ManagerVIC
- FTNetwork and Security Engineer - Checkpoint, Firewalls, VPNNSW
- CCBuild and Release ManagerNSW
- FT.Net CRM Dynamics Developer LeadVIC
- CCInfrastructure ArchitectNSW
- FTHands-on Service Desk Team LeadNSW
- CCLevel 3 Microsoft Resource EngineerVIC
- CCContract Analyst Programmer (Oracle/PL/SQL) 160930/AP/vtdAsia
- CCBusiness Analyst- (MQC, QTP, BPMN, Visio or System Architect;NSW
- CC.Net Sitecore DeveloperVIC
- FTJava Script, Frontend Developer- DynamoDB or MongoDBNSW
- CCAnalyst Programmer (12-month renewable Contract)Asia
- CCSiebel DeveloperACT
- FTRelease CoordinatorACT
- FTBusiness Analyst - HKMAAsia
- CCSenior Systems Engineer - Canberra roleNSW
- CCSenior Security AnalystVIC
- CCE-Commerce - Senior Web DeveloperNSW
- CCContract Systems Analyst (JAVA/J2EE/Web) 161014/SA/922Asia