Cybercriminals stole debit card information from customers of dozens of financial institutions in a phishing campaign that combined rogue text messages and with VoIP calls.
When's the last time you thought about using different passwords for different websites? Perhaps after a bug called Heartbleed started crawling around them.
A cybercriminal operation that combines phone-based social engineering attacks with spear phishing and malware to steal money from organizations has resurfaced this year, finding victims in French-speaking countries in particular.
Web application attacks, cyber-espionage and point-of-sale intrusions were among the top IT security threats in 2013, according to Verizon's latest annual report on data breach investigations.
Worried about how the Heartbleed vulnerability may affect your personal accounts? A new tool may be of help.
A new webmail service called Lavaboom promises to provide easy-to-use email encryption without ever learning its users' private encryption keys or message contents.
The source code of TrueCrypt, a popular disk encryption tool, is not the most polished work of programming, but it has no critical flaws or intentional backdoors, security testers concluded in a report released Monday.
Websites that use encryption could be elevated in Google search results sometime in the future, according to The Wall Street Journal.
Andrew Auernheimer, known online as "weev," has won an appeal against his conviction for exploiting a vulnerability in AT&T's website to collect the email addresses of Apple iPad users. The 2010 incident earned him a 41-month prison sentence.
Four researchers working separately have demonstrated a server's private encryption key can be obtained using the Heartbleed bug, an attack thought possible but unconfirmed.
Jose Vildoza's 62-year-old father was using his old Windows computer when a warning in broken English flashed on the screen: your files have been encrypted.
A 5-year-old San Diego boy has been commended by Microsoft for his security skills after finding a vulnerability in the company's Xbox games console.
In an attempt at clarity, Google has amended its terms of service to say that it analyzes private data, including emails, for purposes including the delivery of ads and customized search results.
Yahoo said Wednesday it was encrypting traffic flowing between its data centers, several months after leaked documents revealed the government had been sniffing those links.
Smaller financial institutions have been warned to look out for attacks that aim to increase the withdrawal limit on customer payment cards for fraud purposes.
Most Popular Reviews
- 1 Fetch TV Mighty review: Better than Foxtel
- 2 Fetch TV Mini review: Make your TV a smart TV
- 3 Parrot Mambo Drone review
- 4 Evapolar USB air conditioner review
- 5 Hisense Series 7 ULED 4K UHD TV review
Join the Good Gear Guide newsletter!
Latest News Articles
- Apple iPhone 7 Plus review: including Portrait Mode
- Civilization VI review: Learning from some (but not all) of history's mistakes
- Dyn attack: US Senator wants to know why IoT security is so anemic
- Apple's Q4 2016 results: Better than expected with 45.5 million iPhones sold, but revenue continues to slide
- DDoS attack shows dangers of IoT 'running rampant'
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- Google Pixel XL full, in-depth smartphone review: The new best Android phone
- TV buying guide: What to look for when buying a TV in 2016
- Best iPhone 7 and iPhone 7 Plus plans: Optus vs Telstra vs Vodafone vs Virgin
- Which flagship TV is best? Sony 4K HDR Bravia 2016 versus LG 4K HDR OLED 2016
- 10 Blu-ray movies / Best looking Blu-ray movies
- CCSolution Architect - BRISBANE BASEDVIC
- CCImplementation ManagerVIC
- TPSoftware Engineer - C++QLD
- FTMicrosoft Dynamics AX Manufacturing ConsultantWA
- FTJunior Java DevelopersACT
- CCITSM Process AnalystNSW
- CCSenior Systems Engineer - Defence - NV1SA
- TPSenior Business AnalystQLD
- CCSAP HANNA ArchitectNSW
- TPService Desk AnalystVIC
- TPSenior Analyst|Progress ProgrammerQLD
- FTData AnalystNSW
- CCFull Stack Developer - Be a part of the innovation programVIC
- CCSenior Front End DeveloperWA
- FTWeb Business AnalystQLD
- CCSnr Business AnalystVIC
- CCEMC Storage ConsultantWA
- CCTesting Capability LeadNSW
- CCOpen_5pm_27/10_Project CoordinatorACT
- CCSolution Architect - BRISBANE BASEDNSW
- FTNetwork EngineerACT
- FTMicrosoft Dynamics AX Finance ConsultantWA
- FTDynamics CRM DeveloperSA
- CCSoftware Engineer- Linux and DevOpsNSW
- FTSr. Insight SpecialistVIC