Hotmail accounts were recently targeted by an attacking against a zero-day vulnerability in the Microsoft Webmail system. The attack is more insidious than some because it executes without user intervention when a malicious email is opened.
I didn't expect to get a ticket to the rapture, but judging from the lack of abandoned vehicles it seems that the rumors of the end of the world were a bit exaggerated. However, even though the world did not come crashing to a halt today, don't let ...
There are phishing scams out there targeting Adobe users. Make sure you know how to recognize and avoid these threats when they arrive in your Inbox.
The death of Osama bin Laden, the dramatic events surrounding the military operation against bin Laden's compound in a posh Pakistani suburb, and the resulting conspiracy theories and fear of retaliatory attacks from Al Qaeda are all very popular top...
Iran claims to have discovered new malware it is calling the Stars worm attacking the nation's critical infrastructure. But, the lack of any sample of the new threat make many security experts skeptical.
Apple released yet another update to iOS this week. iOS 4.3.2 is the second incremental update for iOS in a matter of weeks following the launch of iOS 4.3. Like any incremental update, iOS 4.3.2. contains its share of minor tweaks and fixes, but iOS...
Do not adjust your Web browser. This may look like an identical post to the one from four weeks ago announcing a zero-day vulnerability in Adobe Flash, but it's actually a new one.
A new attack is spreading its way across Facebook, targeting fans of the epic vampire series Twilight. The clickjacking scam demonstrates just how easy it is to spread malware socially -- especially if the bait is a phenomenon like Twilight that has ...
People who make a lot of online transactions, are popular online and who respond to most of the emails they receive are at the highest risk for being duped by malicious phishers, according to a multi-university study.
You have an extra three days to file this year, but the April 18 tax deadline is fast approaching. Tax season can be stressful, or exciting depending on who owes who. Either way, the anxiety over income tax season helps attackers catch people off gua...
Forthcoming versions of Google Chrome will block downloads that Google considers dangerous. Upon clicking a questionable file, users will see a pop-up window saying the "file appears to be malicious," and asking if they want to cancel.
There's hacking, then there's hacktivism. There's malware, then there's Android Trojans like the latest "threat" discovered by Symantec. Android.Walkinwat is like the Batman of mobile malware -- a rogue vigilante seeking justice through means that al...
Adobe is releasing updates today to address a <a href="http://www.pcworld.com/businesscenter/article/222098/adobe_flash_hit_with_zeroday_exploit.html">critical zero-day flaw</a> in Flash Player--and the authplay.dll element used in Adobe Reader and A...
The Rustock botnet--one of the most prolific sources of spam -- has gone silent. Microsoft worked with security vendors and the civil court system to pull the plug on Rustock. Some security experts question, though, if the absence of Rustock will hav...
A large network of hacked computers called Rustock, which was responsible for a great volume of spam, has shut down, perhaps as a result of another coordinated take down by security researchers.
Most Popular Reviews
- 1 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 2 Mazda MX-5 (2016) review: Absolute driving purity
- 3 Sony 75-inch UHD TV (X9400C) review: Sony and Android are a winning duo
- 4 LG 55EG960T OLED UHD TV
- 5 Panasonic Viera UHD TV review: good hardware, fragmented software
Join the Good Gear Guide newsletter!
Best Deals on Good Gear Guide
Latest News Articles
- Modular cellphone kit can be used for IoT and wearables
- Now that AI has mastered 'Go,' are all our jobs next?
- Make a $40 Linux or Android PC with new Raspberry Pi 2 rival
- Researcher finds serious flaw in Chromium-based Avast SafeZone browser
- Dridex banking malware mysteriously hijacked to distribute antivirus program
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTProject ManagerVIC
- FTServer EngineerNSW
- CCContract Analyst Programmer 160120/AP/vvtAsia
- CCTechnical Lead - .NET TechnologiesNSW
- CCBusiness Analyst |Telecommunications / DigitalNSW
- CCContract System Analyst (Network & System Mgt.) 160205/SA/561Asia
- CCHelpdesk SupportNSW
- CCSenior Visual DesignerNSW
- CCApplication Support AnalystNSW
- CCJunior .NET DeveloperQLD
- CCSenior Systems Engineer - SCOM/SCCM/PowerShellVIC
- FTIT Security Governance ManagerNSW
- CCContract Analyst Programmer (JAVA/J2EE/SQL) 160205/AP/541Asia
- CCICT Infrastructure Specialist - (Network Engineer)ACT
- FTManager, Portfolio GovernanceNSW
- CCSenior Agile Business Analyst - Online/Mobile experienceNSW
- CCWindows System Admin, Administrator, Technical SupportNSW
- FTChange & Communications OfficerQLD
- CCSSIS/ SSRS ExpertVIC
- CCProgram Support ManagerQLD
- CCProject Manager IT infrastructureACT
- CCSenior Test AnalystSA
- CCSenior Wintel EngineerNSW
- FTProject Manager | Defence projects | NV1/NV2 cleared | Canberra basedACT
- CCLabour Stream LeadVIC