A well-known cyber-spying tool called Gh0st RAT is still being employed in stealthy malware attacks, according to a new report from security firm FireEye.
Getting hacked on Twitter is fast becoming a rite of passage for big corporations, but Tuesday's attack on the Associated Press could be a tipping point and shows that social networks must do more to keep their users safe, security experts said.
Even though the majority of data breaches continue to be the result of financially motivated cybercriminal attacks, cyberespionage activities are also responsible for a significant number of data theft incidents, according to a report that will be re...
Google must pay a €145,000 (US$190,000) fine in Germany for gathering and storing emails, photos, passwords and chat protocols from unprotected Wi-Fi networks with Google Street View cars, Hamburg's Commissioner for Data Protection and Freedom of Inf...
Pirate Bay co-founder Gottfrid Svartholm Warg was charged with hacking the IBM mainframe of Logica, a Swedish IT firm that provided tax services to the Swedish government, and the IBM mainframe of the Swedish Nordea bank, according to the Swedish pub...
Cybercriminals are increasingly targeting small businesses due to their less sophisticated defenses, according to a new report from Symantec.
Hackers could use vulnerable charging stations to prevent the charging of electric vehicles in a certain area, or possibly even use the vulnerabilities to cripple parts of the electricity grid, a security researcher said during the Hack in the Box co...
It’s early but it has been a bad year for personal data exposure already
The high-end Canon EOS-1D X camera can be hacked for use as a remote surveillance tool, with images remotely downloaded, erased and uploaded, a researcher said during the Hack in the Box security conference in Amsterdam on Wednesday.
Two of Japan's major Internet portals were hacked earlier this week, with one warning that as many as 100,000 user accounts were compromised, including financial details.
A new piece of custom malware sold on the underground Internet market is being used to siphon payment card data from point-of-sale (POS) systems, according to security researchers from antivirus vendor McAfee.
Security vendors analyzing the code used in the cyberattacks against South Korea are finding nasty components designed to wreck infected computers.
A website that leaked credit reports of celebrities and government officials last week appears to have a curious link to the malicious banking software known as "Zeus."
A site that published the private information and credit reports of several celebrities and other public figures last week went offline on Sunday. The last person to have his alleged private information exposed on the site was CIA director John Brenn...
A former Tribune Company employee could face as much as 10 years of jail time over federal charges accusing him of conspiring with members of the hacker group Anonymous to hack into a Tribune website.
Most Popular Reviews
- 1 Samsung Galaxy Tab S (10.5) 4G review
- 2 LG G3 review
- 3 Nokia Lumia 930 review
- 4 Asus G550JK gaming notebook
- 5 Fetch TV set-top box
Best Deals on GoodGearGuide
Latest News Articles
- PC market in 2014 a bit less dire than previously thought
- Cotap, a WhatsApp for the enterprise, links with cloud storage providers
- Apple loses bid for sales ban in Samsung patent case
- Broadcom wants to let 1,000 IoT devices bloom with $19.99 development kit
- Microsoft rolls out DLP to SharePoint Online and OneDrive for Business
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTMarketing Communications Executive - B2BNSW
- FTInformation Services ManagerNZ
- FTAccount Manager Programmatic Trading DeskNSW
- FTChief Information OfficerNSW
- FTSearch Account ManagerNSW
- CCL2 Technical Support Engineer - RightFax/MessagingVIC
- FTMachine Learning | JAVA | San Fran based global Company | SydneyNSW