Hackers reportedly stole 42 million customer records including email addresses and clear-text passwords from Cupid Media, a network of dating websites.
The vBulletin.com forum was not compromised by exploiting a previously unknown vulnerability as a group of hackers claimed, according to vBulletin Solutions, the company that develops the popular Internet forum software.
A group of hackers claim to have exploited an undocumented vulnerability in the vBulletin Internet forum software in order to break into the MacRumors.com and vBulletin.com forums.
Facebook locked some users out of their accounts after determining that their log-in credentials were exposed as a result of a security breach at Adobe. The company is asking users who used the same log-in credentials for Adobe's online services and ...
A new variant of a Trojan program that targets online banking accounts also contains code to search if infected computers have SAP client applications installed, suggesting that attackers might target SAP systems in the future.
Security experts used fake Facebook and LinkedIn profiles pretending to represent a smart, attractive young woman to penetrate the defenses of a U.S. government agency with a high level of cybersecurity awareness, as part of an exercise that shows ho...
Security protocol for the European Council president meant he would never have used the tainted USB stick allegedly given to him by Russia at the G20 Summit council sources confirmed Wednesday.
MongoHQ, which provides hosting and support for the open-source Mongo database, said attackers may have accessed several of its customers' databases earlier this week.
Buffer, a service for scheduling social media posts, said Sunday it has strengthened its security after spammers gained access to its network.
U.S. intelligence agencies may have spied on German Chancellor Angela Merkel's mobile phone, which would be a "grave breach of trust," the German government said late Wednesday.
The Mexican government has condemned newly reported spying activities of the U.S. National Security Agency against the country's former president while he was in office.
Hackers managed to steal a database containing customer credentials and contact information from PR Newswire, a major press release distribution service that's used by tens of thousands of companies and public relations agencies.
A backdoor found in firmware used in several D-Link routers could allow an attacker to change a device's settings, a serious security problem that could be used for surveillance.
Hackers capitalize on other people's mistakes. But they make their own as well.
Hackers broke into the internal computer network of Adobe Systems and stole information on 2.9 million customers, as well as source code for several of the company's products.
Most Popular Reviews
- 1 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 2 Mazda MX-5 (2016) review: Absolute driving purity
- 3 Sony 75-inch UHD TV (X9400C) review: Sony and Android are a winning duo
- 4 LG 55EG960T OLED UHD TV
- 5 Panasonic Viera UHD TV review: good hardware, fragmented software
Join the Good Gear Guide newsletter!
Best Deals on Good Gear Guide
Latest News Articles
- Upgrading to SAP Hana? This new tool can help prepare your code
- The eyes have it: How one startup aims to change the future of VR
- Gaming on Linux, Steam machines set to soar with DirectX competitor Vulkan
- Google didn't abuse its position in Streetmap case, UK court rules
- New Chromebook won't break with 365-pound person standing on it
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTDigital Marketing Specialist | Media BuyerNSW
- FTNetwork Engineer | NV1 NV2 clearance | Defence projects | Immediate interviewACT
- CCSenior Project Manager - Cloud / Telecommunications (Melb CBD)VIC
- CCSenior Network EngineersACT
- CCBilling Assistant / AdministrationACT
- CCBusiness AnalystACT
- FTMobile Designer / Developer - IOSNSW
- FTIT Technical LeadVIC
- CCProject ManagerACT
- CCContract Software Engineer (Crystal Report/JAVA) 160129/SE/vccAsia
- CCOracle Business Analyst / TrainerSA
- CCSAP DS and BI SpecialistVIC
- CCSecurity Consultant/Analyst (Data Loss Prevention)WA
- CCImmediate iOS Developer RequiredNSW
- FTInsight / Customer / modelling - Analyst (Data Scientist)NSW
- CCOracle Apex DeveloperQLD
- FTSenior Linux Sys AdminNSW
- CCSenior Test AnalystSA
- CCTest AnalystACT
- CCWeb Content WriterSA
- CCContract Analyst Programmer (MS.Net/Visual Basic) 160129/AP/vtdAsia
- FTFront End Developer Required Working World Leading Digital TeamNSW
- FTProject Manager | Defence projects | NV1/NV2 cleared | Canberra basedACT
- CCSenior Information Security SpecialistNSW
- FTTeam Lead ITIL- Permanent OpportunityVIC