The Windows 8 Secure Boot mechanism can be bypassed on PCs from certain manufacturers because of oversights in how those vendors implemented the Unified Extensible Firmware Interface (UEFI) specification, according to a team of security researchers.
Attackers are actively targeting Internet-connected industrial control systems (ICS) in an effort to compromise their operation, according to data collected from a global network of honeypot systems that simulate water pumps.
Many door and window sensors, motion detectors and keypads that are part of security systems used in millions of homes and businesses can be bypassed by using relatively simple techniques, according to researchers from security consultancy firm Bisho...
A variety of network-controlled home automation devices lack basic security controls, making it possible for attackers to access their sensitive functions, often from the Internet, according to researchers from security firm Trustwave.
Sensors widely used in the energy industry to monitor industrial processes are vulnerable to attack from 40 miles away using radio transmitters, according to alarming new research.
Software that lets drivers unlock car doors and even start their vehicles using a mobile phone could let car thieves do the very same things, according to computer security researchers at iSec Partners.
The Black Hat Europe conference in Barcelona next week will feature a keynote on cyberwar from Bruce Schneier, and presentations on security flaws in Apple's Mac OS X and SAP's business software.
Barnaby Jack hit the jackpot at Black Hat on Wednesday. Twice.
The GSM technology used by the majority of the world's mobile phones will get some scrutiny at next week's Black Hat security conference, and what the security researchers there have to say isn't pretty.
Looking deeper within malware yields fingerprints of the hackers who write the code, and that could result in signatures that have a longer lifetime than current intrusion-detection schemes, Black Hat 2010 attendees will be told next week.
A well-known cryptographic attack could be used by hackers to log into Web applications used by millions of users, according to two security experts who plan to discuss the issue at an upcoming security conference.
One year after his Black Hat talk on Automated Teller Machine security vulnerabilities was yanked by his employer, security researcher Barnaby Jack plans to deliver the talk and disclose a new ATM rootkit at the computer security conference.
A computer security researcher has released a plugin for Firefox that provides a wealth of data on Web sites that may have been compromised with malicious code.
Researchers have found ways to hide malicious software in commonly used archival formats that went undetected until recently by most antivirus programs.
The Black Hat security conference will kick off next week in Barcelona, with training sessions and briefings from some of the most talented security researchers in the industry.
Latest News Articles
- Google invites Glass wearers to brave LA's beaches
- Telerik frees HTML5 collection of components
- Space X rocket en route to ISS with space laser cargo
- AMD steers clear of low-cost tablet market
- Experts: Avoid big mistakes with Oracle's Exadata
Most Popular Articles
- 1 Buying guide: Ovens, cooktops and freestanding cookers (upright ranges)
- 2 Tethering tutorial: How to use your iPhone as a modem
- 3 The most disturbing YouTube videos of all time
- 4 LCD vs plasma vs LED TVs buying guide
- 5 How to update your Samsung Galaxy S4 to Android 4.3 Google Edition
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
Best Deals on GoodGearGuide
- Notebooks View all »
- $799 free shipping
- 6% off $749 free shipping
- $2649 free shipping
- Tablets View all »
- Mobile Phones View all »
- TVs View all »
- Digital Cameras View all »