Bitcoin's roller-coaster price swings on Wednesday were caused by an influx of new buyers and software that couldn't keep up, according to the largest exchange, Mt. Gox.
“Improving users' experience” is not justification for using consumer information in Big Data projects according to Europe's top data protection officials.
The high-end Canon EOS-1D X camera can be hacked for use as a remote surveillance tool, with images remotely downloaded, erased and uploaded, a researcher said during the Hack in the Box security conference in Amsterdam on Wednesday.
Social network's new overlay for Android smartphones 'would be the first thing I would block on my network,' said one security adviser
An analysis of a piece of Android spyware targeting a prominent Tibetan political figure suggests it may have been built to figure out the victim's exact location.
Finding seen as warning to U.S. companies that mobile OSes are the likely path to cyberespionage attacks
A 28-year-old Romanian man was sentenced on Tuesday to five years in prison for his role in a phishing scheme, as part of a seven-year investigation by the U.S. Department of Justice.
Security vendors analyzing the code used in the cyberattacks against South Korea are finding nasty components designed to wreck infected computers.
A website that leaked credit reports of celebrities and government officials last week appears to have a curious link to the malicious banking software known as "Zeus."
A site that published the private information and credit reports of several celebrities and other public figures last week went offline on Sunday. The last person to have his alleged private information exposed on the site was CIA director John Brenn...
A former Tribune Company employee could face as much as 10 years of jail time over federal charges accusing him of conspiring with members of the hacker group Anonymous to hack into a Tribune website.
A website that provides US consumers with a free annual credit report appears to have been the source used by hackers to download those of celebrities including Beyoncé and government officials including Federal Bureau of Investigation Director Rober...
Reporters Without Borders named five countries that regularly spy on journalists and dissidents, a practice the group contends is made possible with advanced technology from private companies.
German government officials including Chancellor Angela Merkel could soon be communicating about classified matters using BlackBerry Z10 smartphones equipped with a new micro-SD card from SecuSmart.
Evernote is speeding up its plans to offer two-factor authentication to users following a recent data breach that exposed user names, email addresses and encrypted passwords.
Most Popular Reviews
- 1 Samsung Galaxy Tab S (10.5) 4G review
- 2 Nokia Lumia 930 review
- 3 Asus G550JK gaming notebook
- 4 Fetch TV set-top box
- 5 Dell Inspiron 15 5547 laptop
Best Deals on GoodGearGuide
Latest News Articles
- R programming language gaining ground on traditional statistics packages
- How can the Internet have too many routes and not enough addresses?
- OnBeep developing walkie-talkie type wearable for mobile devices
- Samsung builds custom Galaxy Tab 4 Nook tablet with Barnes & Noble
- Tablets with voice calling functions take off in Asia
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.