An attack using the SMB file sharing protocol that has been believed to work only within local area networks for over a decade can also be executed over the Internet, two researchers showed at the Black Hat security conference.
A design flaw in the x86 processor architecture dating back almost two decades could allow attackers to install a rootkit in the low-level firmware of computers, a security researcher said Thursday. Such malware could be undetectable by security prod...
Many smart phone manufacturers preload remote support tools on their Android devices in an insecure way, providing a method for hackers to take control of the devices through rogue apps or even SMS messages.
Inherent insecurity in the routing protocol that links networks on the Internet poses a direct threat to the infrastructure that secures communications between users and websites.
File synchronization services, used to accommodate roaming employees inside organizations, can also be a weak point that attackers could exploit to remain undetected inside compromised networks.
Security researchers demonstrated Thursday flaws that can allow hackers to take over mobile point-of-sale (mPOS) devices from different manufacturers by inserting rogue cards into them.
Today's security software is ineffective against an emerging networking technology already in use by Apple for its Siri voice-recognition software, according to research presented at the Black Hat hacking conference this week.
Exploit kits of cybercrime tools fell into a big slump in the first half of this year after Russian authorities nabbed the alleged creator of the popular Blackhole kit, but users aren't necessarily safer.
The Windows 8 Secure Boot mechanism can be bypassed on PCs from certain manufacturers because of oversights in how those vendors implemented the Unified Extensible Firmware Interface (UEFI) specification, according to a team of security researchers.
Attackers are actively targeting Internet-connected industrial control systems (ICS) in an effort to compromise their operation, according to data collected from a global network of honeypot systems that simulate water pumps.
Many door and window sensors, motion detectors and keypads that are part of security systems used in millions of homes and businesses can be bypassed by using relatively simple techniques, according to researchers from security consultancy firm Bisho...
A variety of network-controlled home automation devices lack basic security controls, making it possible for attackers to access their sensitive functions, often from the Internet, according to researchers from security firm Trustwave.
Sensors widely used in the energy industry to monitor industrial processes are vulnerable to attack from 40 miles away using radio transmitters, according to alarming new research.
Software that lets drivers unlock car doors and even start their vehicles using a mobile phone could let car thieves do the very same things, according to computer security researchers at iSec Partners.
The Black Hat Europe conference in Barcelona next week will feature a keynote on cyberwar from Bruce Schneier, and presentations on security flaws in Apple's Mac OS X and SAP's business software.
Most Popular Reviews
- 1 Fetch TV Mighty review: Better than Foxtel
- 2 Fetch TV Mini review: Make your TV a smart TV
- 3 Parrot Mambo Drone review
- 4 Evapolar USB air conditioner review
- 5 Hisense Series 7 ULED 4K UHD TV review
Join the Good Gear Guide newsletter!
Latest News Articles
- Which is the best travel SIM for Japan in 2016?
- AMD drops Radeon RX 460, RX 470 prices ahead of Nvidia's GeForce GTX 1050 launch
- AT&T will acquire Time Warner for US$85.4b in content play
- Gallipoli is now an amazing video game
- iPads and Apple TV aimed at transforming patient care
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- Google Pixel XL full, in-depth smartphone review: The new best Android phone
- TV buying guide: What to look for when buying a TV in 2016
- Best iPhone 7 and iPhone 7 Plus plans: Optus vs Telstra vs Vodafone vs Virgin
- Which flagship TV is best? Sony 4K HDR Bravia 2016 versus LG 4K HDR OLED 2016
- 10 Blu-ray movies / Best looking Blu-ray movies
- FTMicrosoft Dynamics AX Technical ArchitectNSW
- CCContract Analyst Programmer (HTML/JAVA/J2EE) 161025/AP/862Asia
- TPCRM Business AnalystVIC
- FTFront End DeveloperSA
- FTMicrosoft Dynamics AX Finance ConsultantQLD
- CCAccounts Payable/Contract Officer- NSW Government backgroundNSW
- CCBusiness Analyst/Systems Analyst (DW/BI)ACT
- CCNetwork DesignerVIC
- FTProfessional Learning Facilitator - Information ManagementVIC
- FTBiomedical Project ManagerQLD
- CCSAP ERP ArchitectNSW
- FTOperations SupportNSW
- CCNetwork EngineerNSW
- FTSenior Murex DeveloperVIC
- CCFront End Developer (UI) - 12 Month ContractNSW
- CCSenior Security AnalystVIC
- CCIT Manager - ANZNSW
- CCContract Junior Programmer (J2EE/SQL) 161019/JP/552Asia
- TPAndroid Developer | Tech Start-UpNSW
- FTMicrosoft Dynamics AX Finance ConsultantACT
- TPICT Security SpecialistQLD
- FTSolution Architect - Application/IntegrationVIC
- TPSAP Project ManagerSA
- CCICT Business AnalystACT