They spread lies. They push products you don't care about. They make unpopular people look popular. Sometimes, they take over your machine with malware.
Cybercriminals stole debit card information from customers of dozens of financial institutions in a phishing campaign that combined rogue text messages and with VoIP calls.
When's the last time you thought about using different passwords for different websites? Perhaps after a bug called Heartbleed started crawling around them.
Web application attacks, cyber-espionage and point-of-sale intrusions were among the top IT security threats in 2013, according to Verizon's latest annual report on data breach investigations.
About 2.6 million payment cards at Michaels Stores and another 400,000 at subsidiary Aaron Brothers may have been affected in a card skimming attack that compromised its point-of-sale systems, the retailer said Thursday.
Canadian police have arrested a 19-year-old man for allegedly using the Heartbleed bug to steal data about taxpayers.
Four researchers working separately have demonstrated a server's private encryption key can be obtained using the Heartbleed bug, an attack thought possible but unconfirmed.
The Identity Theft Resource Center, which tracks data breaches, has counted 204 of them from January 1 to March 27.
A 5-year-old San Diego boy has been commended by Microsoft for his security skills after finding a vulnerability in the company's Xbox games console.
A group of state attorneys general in the U.S. is launching an investigation into a recently disclosed data breach of 200 million personal records at a subsidiary of credit monitoring firm Experian.
In an attempt at clarity, Google has amended its terms of service to say that it analyzes private data, including emails, for purposes including the delivery of ads and customized search results.
A botnet that was slowly shrinking has taken on a new trick: brute-forcing routers set to easy-to-guess credentials.
Yahoo said Wednesday it was encrypting traffic flowing between its data centers, several months after leaked documents revealed the government had been sniffing those links.
Smaller financial institutions have been warned to look out for attacks that aim to increase the withdrawal limit on customer payment cards for fraud purposes.
Many companies have felt the effects of data theft over the last several years. It's 2014 and it doesn't look like the going is getting any easier. The technology sector seems most at risk with every week bringing the world another reported data brea...
Most Popular Reviews
- 1 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 2 Mazda MX-5 (2016) review: Absolute driving purity
- 3 Sony 75-inch UHD TV (X9400C) review: Sony and Android are a winning duo
- 4 LG 55EG960T OLED UHD TV
- 5 Panasonic Viera UHD TV review: good hardware, fragmented software
Join the Good Gear Guide newsletter!
Best Deals on Good Gear Guide
Latest News Articles
- Apple to replace defective USB-C cables that shipped with some 12-inch MacBooks
- Upgrading to SAP Hana? This new tool can help prepare your code
- The eyes have it: How one startup aims to change the future of VR
- Gaming on Linux, Steam machines set to soar with DirectX competitor Vulkan
- Google didn't abuse its position in Streetmap case, UK court rules
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTDigital Marketing Specialist | Media BuyerNSW
- CCAndroid and iOS DevelopersVIC
- FTWeb Analytics Specialist - TechnicalNSW
- FTSenior Linux Sys AdminNSW
- CCJava Development EngineerNSW
- FTSenior Portfolio Manager - IT ProjectsNSW
- CCOperations AnalystNSW
- CCOrganisational Change AnalystQLD
- FTSystems Administrator/Engineer | Projects & BAU | Coastal Newcastle NSWWA
- FTSenior Unified Communications Consultant - National IT ServicesNSW
- CCiOS DeveloperNSW
- FTBusiness Intelligence AnalystVIC
- FTOracle Middleware ConsultantNSW
- CCContract Programmer (Crystal Reports/JAVA/SQL) 160129/P/vhs-cAsia
- FTBusiness Analyst - Superannuation FundVIC
- CCEnterprise Systems Infrastructure SpecialistNSW
- CCSenior Server EngineerNSW
- CCBusiness AnalystACT
- CCSenior Business Analyst, Enterprise Software SolutionNSW
- FTFull Stack & Mobile EngineersNSW
- CCIBM ESB Developer (Junior to mid level role)NSW
- CCPega BPM Developer / Configurer - 12 months contractACT
- CCCommercial Manager - Strategy / Big Data - Telecommunications -NSW
- FTJava Full Stack Developer - MelbourneVIC
- FTSenior Front End Developer Required Working World Leading Digital TeamVIC