We list the worst data breach incidents recorded by ITRC
U.S. lawmakers plan to resurrect national data breach notification legislation that has failed to pass in past sessions of Congress, but some advocates don't agree on what should be included in a bill.
As SAP invests heavily in mobile, a security testing company will release a tool next month to ensure mobile-accessible SAP systems are not vulnerable to hackers.
Edward Snowden, the leaker of documents that revealed National Security Agency surveillance programs, has submitted a request for temporary asylum in Russia and could be granted a decision within several weeks, according to news reports.
Insurance provider WellPoint has agreed to pay a $1.7 million fine for exposing more than 600,000 personal records online due to weak database security, the U.S. Department of Health & Human Services (HHS) said Thursday.
A noisy malware campaign against South Korea is revealing deeper secrets.
China saw an increase in Trojan and botnet attacks coming from other countries in 2012, as the amount of mobile malware in the country also surged, according to a local security group.
Game maker Ubisoft said on Tuesday an account database was breached due to unauthorized access of one of its websites, revealing users' personal information.
A U.S. man prosecuted for exposing a weakness in how AT&T handled the personal data of its iPad users filed an appeal on Monday of his conviction and 41-month sentence.
Google is revealing some new numbers around malware and phishing attempts in an effort to get more people thinking about online security and to make the Web safer.
Facebook has admitted that a year-long glitch has resulted in 6 million users' personal details being exposed.
Edward Snowden, the former NSA contractor who leaked information about U.S. government mass surveillance programs, has been charged by the U.S. with espionage, the Washington Post reported Friday.
British intelligence agency Government Communications Headquarters (GCHQ) reportedly intercepted the electronic communications of foreign politicians during G20 meetings that took place in London in 2009.
Cyberespionage campaign 'NetTraveler' siphoned data from hundreds of high-profile targets, researchers say
An ongoing cyberespionage campaign compromised over 350 high-profile victims from more than 40 countries over the past eight years, including political activists, research centers, governmental institutions, embassies, military contractors and privat...
Add LinkedIn to the list of Internet companies trying to make themselves safer from cyberattacks by adding two-step authentication.
Most Popular Reviews
- 1 Sony Xperia Z3 review: The no-frills flagship
- 2 Samsung's Galaxy Alpha review: A peek into the Galaxy S6
- 3 Samsung Galaxy Note 4 review: The busiest, biggest and best Samsung phablet
- 4 Aldi's $279 Bauhn Sphere review: Disappointing
- 5 Nokia Lumia 735 review: Perfectly ordinary
Best Deals on GoodGearGuide
Latest News Articles
- Judge questions evidence on whether NSA spying is too broad
- Three ways enterprise software is changing
- T-Mobile to pay $90M for unauthorized charges on customers' bills
- Companies battle for control of Italy's national fiber network
- Obama promises response on Sony hack, says pulling movie was mistake
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.