MongoHQ, which provides hosting and support for the open-source Mongo database, said attackers may have accessed several of its customers' databases earlier this week.
Buffer, a service for scheduling social media posts, said Sunday it has strengthened its security after spammers gained access to its network.
U.S. intelligence agencies may have spied on German Chancellor Angela Merkel's mobile phone, which would be a "grave breach of trust," the German government said late Wednesday.
The Mexican government has condemned newly reported spying activities of the U.S. National Security Agency against the country's former president while he was in office.
Hackers managed to steal a database containing customer credentials and contact information from PR Newswire, a major press release distribution service that's used by tens of thousands of companies and public relations agencies.
A backdoor found in firmware used in several D-Link routers could allow an attacker to change a device's settings, a serious security problem that could be used for surveillance.
Hackers capitalize on other people's mistakes. But they make their own as well.
Hackers broke into the internal computer network of Adobe Systems and stole information on 2.9 million customers, as well as source code for several of the company's products.
A popular Bitcoin forum, Bitcointalk.org, remained offline Wednesday night as it investigated a cyberattack.
Alex Holden, founder of security company Hold Security, is in the business of bringing companies bad news.
Hackers backed by Iran have penetrated an unclassified U.S. Navy network in one of the most serious incidents of cybercrime yet by the Middle East nation, according to a report Friday.
A hacking group that targeted Japan's parliament in 2011 is believed to have conducted nimble data thefts against organizations mainly in South Korea and Japan, including defense contractors, over the past two years.
The U.S. Federal Trade Commission has no jurisdiction or legal authority to bring a data breach complaint against an Atlanta medical laboratory, the lab said in a response to FTC charges.
The U.S. Federal Trade Commission should back away from its claim of broad authority to seek sanctions against companies for data breaches when it has no clearly defined data security standards, critics of the agency said Thursday.
Following through on an order earlier this year from U.S. President Barack Obama, the National Institute of Standards and Technology (NIST) is rapidly developing a set of guidelines and best practices to help organizations better secure their IT syst...
Most Popular Reviews
- 1 Ford Focus ST (2015) review: Absolutely mental styling, engine, handling
- 2 LG 65-inch UHD TV (65UF950T) review
- 3 Playing chicken with a Tesla Model S
- 4 Audi TT (2015) review: A smarter take on the sports coupe
- 5 Microsoft Lumia 640 review: Honouring Nokia's legacy
Join the Good Gear Guide newsletter!
Deals on Good Gear Guide
- Networking, Wireless & VoIP
Deals on Good Gear Guide
Latest News Articles
- Microsoft bests Google in patent case appeal
- Yahoo picks up fashion commerce site Polyvore
- Mt. Gox CEO Karpeles arrested by Japanese police
- Facebook says Flash security woes could hurt its business
- IBM fattens patent portfolio in cloud tech
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCMarketing Coordinator - World's largest search engine!NSW
- FTDevOps Consultant - Microsoft Experience - Digital ConsultancyVIC
- CCLead Generator - Software SolutionsNSW
- FTTechnical Sales Support Representative - The Worlds largest Search Engine!NSW
- FTBusiness Development Manager & Account ManagerVIC
- FTSenior Network EngineerNSW
- FTDesktop Engineering ManagerNSW
- CCAccount Strategist | Sales Executive | Global Search EngineNSW
- FTField EngineerNSW