BitTorrent applications used by hundreds of millions of users around the world could be tricked into participating in distributed denial-of-service (DDoS) attacks, amplifying the malicious traffic generated by attackers by up to 50 times.
An Italian teenager has found two zero-day vulnerabilities in Apple's OS X operating system that could be used to gain remote access to a computer.
An unpatched vulnerability in the Google Admin application for Android can allow rogue applications to steal credentials that could be used to access Google for Work acccounts.
Google has released another patch for the Stagefright vulnerability after a security firm said the first one didn't fix it.
Three “high risk” vulnerabilities in SAP Mobile could give attackers access to encrypted information stored in mobile devices, security firm Onapsis reported Wednesday.
As if recent research on car hacking wasn't frightening enough, a new study shows yet another danger to increasingly networked vehicles.
Oracle published, then quickly deleted, a blog post criticizing third-party security consultants and the enterprise customers who use them.
With their own dedicated processor and operating system, LTE/3G modems built into new business laptops and tablets could be a valuable target for hackers by providing a stealthy way to maintain persistent access to an infected device.
An attack using the SMB file sharing protocol that has been believed to work only within local area networks for over a decade can also be executed over the Internet, two researchers showed at the Black Hat security conference.
A group of Israeli researchers have improved on a way to steal data from air-gapped computers, thought to be safer from attack due to their isolation from the Internet.
A design flaw in the x86 processor architecture dating back almost two decades could allow attackers to install a rootkit in the low-level firmware of computers, a security researcher said Thursday. Such malware could be undetectable by security prod...
Many smart phone manufacturers preload remote support tools on their Android devices in an insecure way, providing a method for hackers to take control of the devices through rogue apps or even SMS messages.
Software-defined switches hold a lot of promise for network operators, but new research due to be presented at Black Hat will show that security measures haven't quite caught up yet.
An improved attack on the firmware in Apple computers makes them vulnerable to hard-to-detect malware without even being connected to a network, according to a Black Hat conference presentation due to be given later this week.
In late 2008, a worm called Conficker began infecting millions of computers, startling the computer security community into action.
Most Popular Reviews
- 1 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 2 Mazda MX-5 (2016) review: Absolute driving purity
- 3 Sony 75-inch UHD TV (X9400C) review: Sony and Android are a winning duo
- 4 LG 55EG960T OLED UHD TV
- 5 Panasonic Viera UHD TV review: good hardware, fragmented software
Join the Good Gear Guide newsletter!
Best Deals on Good Gear Guide
Latest News Articles
- Microsoft's Azure Stack beta gets new services and DevOps tools
- Amaysim wins with lowest TIO complaints
- Prysm combines displays with SaaS to extend the reach of enterprise collaboration
- Forget Trump and Clinton: IBM's Watson is running for president
- 5G might be your next home broadband service
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCSenior Wintel EngineerNSW
- CCContract Junior Programmer (JAVA/Mobile App) 160115/JP/vhaAsia
- CCProject Manager - Customer Engagement / NPSVIC
- CCAEM DeveloperNSW
- FTSystems Administrator/Engineer | Projects & BAU | Coastal Newcastle NSWWA
- CCHigh Level Network Engineer (Communications)WA
- CCOracle Business AnalystSA
- FTManager, Portfolio GovernanceNSW
- FTBusiness Analyst (SCADA / CSI)VIC
- CCInformation ArchitectQLD
- FTProgram Test DirectorNSW
- CCDesktop Support L1, 2 & 3NSW
- FTSenior Systems/SAN EngineerNSW
- FTC# .Net DeveloperSA
- CCSenior Business Analyst, Online Gaming SystemsNSW
- CCBusiness Project Manager - Transformation ProgramNSW
- CCLevel 2 Helpdesk, Service Support- Remedy or SAP backgroundNSW
- FTUX Front-End DeveloperWA
- CCWintel Support EngineerNSW
- CCSenior Business Analyst - NPPVIC
- CCWeb Content WriterSA
- FTSystems Engineer / Administrator - Managed ServicesNSW
- CCApplication Support AnalystNSW
- CCSharePoint EngineerACT
- CCIT Security EngineerNSW