A program that pays researchers for information on software vulnerabilities, the Internet Bug Bounty (IBB), will now also reward those who develop tools and techniques to spot bugs.
For Microsoft, the vulnerabilities just keep popping up, and appear to be surfacing more quickly than ever before.
A vulnerability found in the late 1990s in Microsoft Windows can still be used to steal login credentials, according to a security advisory released Monday.
An otherwise unremarkable hacking group likely aligned with China appears to be one of the first to have targeted so-called air-gapped networks that are not directly connected to the Internet, according to FireEye.
French-language TV network TV5Monde was hit by a crippling cyberattack Wednesday that disrupted broadcasting across its channels and also involved the hijacking of its website and social media accounts.
A vulnerability in the popular WP Super Cache plug-in for WordPress could allow attackers to inject malicious scripts into websites. The scripts, when loaded by administrators, could trigger unauthorized actions.
A large number of ads distributed by a Google advertising partner redirected users to Web-based exploits that attempted to install malware on users' computers.
The Federal Bureau of Investigation warned on Tuesday that attackers claiming to be sympathetic to the extremist group ISIS are targeting websites that have vulnerable WordPress plugins.
The open-source and free software user group Linux Australia said personal information for attendees of two conferences it hosts may have been leaked after malware was found on one of its servers.
Security vendor Malwarebytes has flagged the Dell System Detect tool as a potentially unwanted application after older versions of the program were found to put computers at risk.
A new open-source tool can periodically scan an area for rogue Wi-Fi access points and can alert network administrators if any are found.
Over 100,000 devices have a misconfigured service called multicast DNS that accepts requests from the Internet and can potentially be abused to amplify distributed denial-of-service (DDoS) attacks.
It's not clear if the U.S. government is living up to its promise to disclose serious software flaws to technology companies, a policy it put in place five years ago, according to the Electronic Frontier Foundation.
The U.S. Congress is moving forward quickly with legislation that would encourage private companies to share cyberthreat information with government agencies, despite concerns that two leading bills weaken consumer privacy protections.
Some Internet gateway devices commonly used by hotels and conference centers can easily be compromised by hackers, allowing them to launch a variety of attacks against guests accessing the Wi-Fi networks.
Most Popular Reviews
- 1 Fetch TV Mighty review: Better than Foxtel
- 2 Fetch TV Mini review: Make your TV a smart TV
- 3 Parrot Mambo Drone review
- 4 Evapolar USB air conditioner review
- 5 Hisense Series 7 ULED 4K UHD TV review
Join the Good Gear Guide newsletter!
Latest News Articles
- Best Travel SIMs for Japan
- AMD drops Radeon RX 460, RX 470 prices ahead of Nvidia's GeForce GTX 1050 launch
- AT&T will acquire Time Warner for US$85.4b in content play
- Gallipoli is now an amazing video game
- iPads and Apple TV aimed at transforming patient care
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- Google Pixel XL full, in-depth smartphone review: The new best Android phone
- TV buying guide: What to look for when buying a TV in 2016
- Best iPhone 7 and iPhone 7 Plus plans: Optus vs Telstra vs Vodafone vs Virgin
- Which flagship TV is best? Sony 4K HDR Bravia 2016 versus LG 4K HDR OLED 2016
- 10 Blu-ray movies / Best looking Blu-ray movies
- CCContract IT Assistant (PC LAN Support) 161114/ITA/411Asia
- CCSenior Web DeveloperNSW
- CCApplication Support AnalystVIC
- PTService Management AnalystSA
- CCSAP Release & Deployment ManagerNSW
- CCAcquisition Marketing Executive - B2BNSW
- CCData ScientistVIC
- CCAnalyst Programmer (12-Month Renewable Contract)Asia
- CCWindows EngineerACT
- CCContract Systems Analyst (Oracle/Unix/WebLogic) 161020/SA/693Asia
- FTWeb DeveloperNSW
- CCE-Commerce - Senior Web DeveloperNSW
- CCContract Analyst Programmer (Web Programming) 161013/AP/185Asia
- CCSenior Procurement SpecialistVIC
- CCSolution ArchitectNSW
- FTSoftware Developers | .Net 4.6 | Multiple RolesNSW
- FTSOE ArchitectNSW
- CCSenior Security AnalystVIC
- CCDigital Producer - 3 Month Contract Immediate Start!NSW
- CCSAS DI DeveloperNSW
- CCApplication Support DeveloperVIC
- CCBusiness Process Specialist/AnalystNSW
- CCField EngineerVIC
- CCIT Senior Systems Administrator- Server Patching RemediationNSW
- FTTechnical Support Engineer | Cloud | Automation techsNSW