A hacker exploited publicly known vulnerabilities to install malware on network-attached storage systems manufactured by Synology and used their computing power to generate Dogecoins, a type of cryptocurrency.
Some of the Internet's most visited websites that encrypt data with the SSL protocol are still susceptible to a recently announced vulnerability that could allow attackers to intercept and decrypt connections.
TrueCrypt remains the only way to encrypt Amazon Simple Storage Service (S3) data when using the AWS Import/Export tool, two weeks after the popular encryption software was abruptly discontinued by its creators, supposedly for security reasons.
A hard-to-tracking hacking group, known to use zero-day attacks, changed tack to use social media in an attempt to compromise an employee of an energy company, according to new research from FireEye.
For this month's round of software patches, Microsoft has issued a record 59 fixes for its Internet Explorer (IE) browser, including one critical vulnerability that had remained unpatched since it was made public May 22.
Many servers expose insecure management interfaces to the Internet through microcontrollers embedded into the motherboard that run independently of the main OS and provide monitoring and administration functions.
Malicious advertisements on domains belonging to Disney, Facebook, The Guardian newspaper and others are leading people to malware that encrypts a computer's files until a ransom is paid, Cisco Systems has found.
A newly discovered vulnerability that allows spying on encrypted SSL/TLS communications has been identified and fixed in the widely used OpenSSL library.
A serious vulnerability that could be exploited to crash TLS clients and potentially execute malicious code on underlying systems was patched in the popular GnuTLS cryptographic library.
Many WordPress websites could be at risk of compromise if their administrators don't upgrade a popular search engine optimization (SEO) plug-in to a newly released version that fixes serious vulnerabilities.
Nice Systems of Israel said it patched remaining critical flaws in its call recording software used by law enforcement, but the consultancy that discovered the risky flaws hasn't verified the fixes.
The GPRS Roaming Exchange (GRX) network, which carries roaming traffic among hundreds of mobile operators worldwide, contains Internet-reachable hosts that run vulnerable and unnecessary services, recent security scans reveal.
The Secure Boot security mechanism of the Unified Extensible Firmware Interface (UEFI) can be bypassed on around half of computers that have the feature enabled in order to install bootkits, according to a security researcher.
An Adobe Flash player vulnerability is being used in attacks on a massive scale against Web users, mostly in Japan, to collect online banking details, according to new research from Symantec.
Inexpensive equipment can be used to disrupt vessel-tracking systems and important communications between ships and port authorities, according to two security researchers.
Most Popular Reviews
- 1 Microsoft Lumia 640 review: Honouring Nokia's legacy
- 2 Samsung SUHD smart TV (JS9500) review
- 3 Samsung Galaxy S6 Edge review: Return to Glory
- 4 Samsung Galaxy S6 (32GB) review: Simply, the best Samsung Galaxy
- 5 LG 55-inch curved OLED (55EC930T) TV review: The future of OLED is bright
Join the Good Gear Guide newsletter!
Best Deals on GoodGearGuide
Latest News Articles
- Pebble Time smartwatch to begin shipping on May 27
- Adblock browsers for Android and iOS to keep mobile ads, tracking at bay
- Torque G02 smartphone doesn't mind a saltwater dunk
- The Upload: Your tech news briefing for Friday, May 22
- Factory reset in Android phones leaves sensitive user data behind
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTSenior Digital B2B Sales Manager | Household BrandNSW
- FTSenior SQL DBANSW
- FTApplication Security SpecialistNSW
- CCMobile Designer / Developer - IOSNSW
- FTSMB Direct Sales Account Executive | Largest Global Online MarketplaceNSW
- FTSENIOR FORMS ANALYST (13767)QLD
- FTKey Account ManagerNSW
- CCMobile Designer / Developer - IOSNSW
- FTSenior Sales Executive X 3 World Leading Music Streaming PlatformNSW