Despite disagreements, Europe’s justice ministers Monday agreed “in principle” that companies doing business in the European Union will have to answer only one data protection authority rather than 28.
Hackers broke into the internal computer network of Adobe Systems and stole information on 2.9 million customers, as well as source code for several of the company's products.
A popular Bitcoin forum, Bitcointalk.org, remained offline Wednesday night as it investigated a cyberattack.
Yahoo will stop giving T-shirts as a reward for finding security vulnerabilities after a public shaming it's calling "t-shirt gate."
The flood of stories on government spying will not be slowing soon -- in fact the majority of the most important documents detailing how the U.S. National Security Agency collects personal data have not been published yet, journalists from U.K. newsp...
Alex Holden, founder of security company Hold Security, is in the business of bringing companies bad news.
A hacking group that targeted Japan's parliament in 2011 is believed to have conducted nimble data thefts against organizations mainly in South Korea and Japan, including defense contractors, over the past two years.
European politicians on Tuesday demanded the suspension of a wide-reaching data sharing agreement between the United States and the European Union following allegations that the U.S. National Security Agency (NSA) tapped into the international bank t...
Facebook, Google and Yahoo on Monday filed petitions with the Foreign Intelligence Surveillance Court as part of a renewed collective effort to provide more information to their users about government data requests.
Following through on an order earlier this year from U.S. President Barack Obama, the National Institute of Standards and Technology (NIST) is rapidly developing a set of guidelines and best practices to help organizations better secure their IT syst...
Technology companies may be hiding behind legal jargon to avoid being more forthcoming in their responses to new documents on government surveillance that were disclosed Friday, some experts say.
The capabilities of malware targeting the market-leading Android platform are mimicking those of Trojans that have wrung profits from Windows PC users for years, a new study shows.
A feature that allows Android users to authenticate themselves on Google websites without having to enter their account password can be abused by rogue apps to give attackers access to Google accounts, a security researcher has revealed.
Businesses more interested in controlling which apps are installed on the phones, and separating corporate data from users' personal data
Latest News Articles
- Brother MFC-J6920DW multifunction centre
- Vodafone now selling 4G-enabled Samsung Galaxy Ace 3
- Adobe patches critical vulnerabilities in Flash Player, Shockwave
- Telstra now selling Samsung's new Galaxy Note 10.1
- Google opens data centers in Taiwan and Singapore to handle Asian traffic
Most Popular Articles
- 1 How to update your Samsung Galaxy S4 to Android 4.3 Google Edition
- 2 Aldi's new budget 8in Android tablet has 3G, makes phone calls
- 3 Tethering tutorial: How to use your iPhone as a modem
- 4 Capacitive vs resistive touchscreens
- 5 Aldi's new budget Android smartphone isn't very good value
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
Best Deals on GoodGearGuide
Best Deals on PCWorld
- TabletsView all »
- NotebooksView all »
- Mobile PhonesView all »
- Printers & ScannersView all »
- Networking, Wireless & VoIPView all »