The creators of a Web-based attack tool called Angler Exploit Kit have added an exploit for a known vulnerability in Microsoft's Silverlight browser plug-in to the tool's arsenal.
Trend Micro has found two malicious browser extensions that hijack Twitter, Facebook and Google+ accounts.
A new piece of digitally signed spyware for Mac OS X uses a special Unicode character in its file name to hide its real file extension from users and trick them into installing it.
Twitter's SMS-based, two-factor authentication feature could be abused to lock users who don't have it enabled out of their accounts if attackers gain access to their log-in credentials, according to researchers from Finnish antivirus vendor F-Secure...
Security researchers have identified multiple samples of the recently discovered "KitM" spyware for Mac OS X, including one dating back to December 2012 and targeting German-speaking users.
Previously unknown Mac OS X spyware, signed with a valid Apple Developer ID, has turned up on the laptop of an activist from Angola at a human rights conference in Norway.
The Android threat landscape is growing in both size and complexity with cybercriminals adopting new distribution methods and building Android-focused malware services, according to a report from Finnish security vendor F-Secure.
A recently patched Java remote code execution vulnerability is already being exploited by cybercriminals in mass attacks to infect computers with scareware, security researchers warn.
Recent reports from antivirus companies seem to suggest that the number of Android malware threats is growing. However, there are still many skeptics who think that the extent of the problem is exaggerated.
The administrators of a popular iOS developer Web forum called iPhoneDevSDK confirmed Wednesday that it had been compromised by hackers who used it to launch attacks against its users. Security experts believe the site served as a gateway for the rec...
The prevalence with which hackers are handing out headaches to IT security pros will have a big upside for vendors in the coming year, according to new figures from Canalys.
Researchers from security vendor F-Secure have spotted a rare malicious software sample that carried a valid code-signing certificate from a Malaysian governmental institution.
A new variant of the DroidKungFu Android Trojan is posing as a legitimate application update in order to infect handsets, according to security researchers from Finnish antivirus vendor F-Secure.
The past couple of weeks have not been the best for Mac OS X's security reputation.
Security firms today warned Mac users of a new Trojan horse that masquerades as a PDF document.
Latest News Articles
- Nokia Lumia 1520 Windows Phone
- Imation 2-in-1 Micro USB Flash drive for Android
- IN PICTURES: Game Masters exhibition explores history's most influential (+74 photos)
- Privacy groups ask FCC to rule that carriers cannot share phone records
- Microsoft launches network of Azure providers
Most Popular Articles
- 1 How to update your Samsung Galaxy S4 to Android 4.3 Google Edition
- 2 Capacitive vs resistive touchscreens
- 3 Aldi's new budget 8in Android tablet has 3G, makes phone calls
- 4 Tethering tutorial: How to use your iPhone as a modem
- 5 Aldi's new budget Android smartphone isn't very good value
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
Best Deals on GoodGearGuide
Best Deals on PCWorld
- TabletsView all »
- NotebooksView all »
- Mobile PhonesView all »
- Printers & ScannersView all »
- Networking, Wireless & VoIPView all »