After hitting an all-time high in the third quarter of 2010, click fraud incidence dropped last quarter, although the practice still rendered almost one in five cost-per-click (CPC) ads useless for the marketers that paid for them.
A new report from Akamai Technologies shows that hackers appear to be increasingly using the Telnet remote access protocol to attack corporate servers over mobile networks.
Researchers have developed a low-profile Trojan horse program for Google's Android mobile OS that steals data in a way that is unlikely to be detected by either a user or antivirus software.
Visa is targeting better fraud detection, through investments in modelling software.
The sale of hacked iTunes accounts in China has been dealt a blow as the Chinese online retailer Taobao.com has decided to remove all product listings relating to the sale of the stolen accounts.
Amazon retailers are being targeted by fraudsters who have created a custom-built a program that generates fakes receipts for nonexistent orders, according to researchers from GFI Software.
A cryptographic system used by Canon to ensure that digital images haven't been altered is flawed and can't be fixed, according to a Russian security company that specializes in encryption.
Dutch police took unprecedented action in taking down a botnet on Monday: They uploaded their own program to infected computers around the world, a move that likely violated computer crime laws.
A group of malicious hackers who attacked Twitter and the Chinese search engine Baidu are also apparently running a for-rent botnet, according to new research.
Google has added notification for phishing URLs to its service that lets administrators know if their networks have been compromised.
Microsoft has seen a dramatic drop in the number of computers infected with Waledac, a piece of malicious software affiliated with a botnet that was once responsible for a massive amount of spam.
The Zeus botnet remains a robust network that is difficult to destroy despite an international sting operation that saw dozens arrested this week for allegedly stealing money from online bank accounts.
Researchers are seeing an uptick in the number of spam-related domains from Russian registrars, a sign that cybercriminals are choosing those providers due to lax enforcement.
Armin Van Buuren is one of the world's most well-known trance music DJs. He also apparently has had his credit card details stolen.
A Nigerian man has been sentenced to 12 years in prison for sending out fraudulent e-mails offering victims big bucks in exchange for moving cash to the United States.
Latest News Articles
- Dick Smith awards SIM-enabled tablet purchases with $30 Globalgig credit
- Studio Proper PA1 Bluetooth speaker
- AusBBS introduces SOHO NBN plans
- Football Manager 2014 (PC)
- Call of Duty: Ghosts (Xbox One)
Most Popular Articles
- 1 How to update your Samsung Galaxy S4 to Android 4.3 Google Edition
- 2 Aldi's new budget 8in Android tablet has 3G, makes phone calls
- 3 Samsung targets Galaxy of kids with latest tablet
- 4 Capacitive vs resistive touchscreens
- 5 Tethering tutorial: How to use your iPhone as a modem
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
Best Deals on GoodGearGuide
Best Deals on PCWorld
- Printers & ScannersView all »
- NotebooksView all »
- TabletsView all »
- Mobile PhonesView all »
- Networking, Wireless & VoIPView all »