Antivirus firm Bitdefender unveiled a hardware security appliance for home networks Tuesday that aims to protect devices by scanning network traffic to detect and block potential security threats.
After Symantec blew the lid on Regin on Sunday, computer security experts and companies are revealing information that has lead to suspicions that the U.S. and U.K. are involved.
For the first time since Stuxnet was discovered in 2010, researchers have publicly named the worm's original victims: five Iranian companies involved in industrial automation.
A multi-year study of cyberattacks against 10 activist and human rights groups shows they're hit with the same types of intrusions as large organizations but have far fewer resources to defend themselves.
Microsoft's Enhanced Mitigation Experience Toolkit (EMET), a security program popular with companies, was updated Monday to harden the exploit mitigations that it adds to other programs and to address compatibility issues with some of them.
A security researcher has developed a tool to demonstrate how the unauthenticated data packets in the 802.11 wireless LAN protocol can be used as a covert channel to control malware on an infected computer.
A cyberespionage group that has built its operations around a malware program called BlackEnergy has been compromising routers and Linux systems based on ARM and MIPS architectures in addition to Windows computers.
Pirate Bay co-founder Gottfrid Svartholm Warg has been sentenced by the Court of Frederiksberg in Denmark to three-and-a-half years in jail for hacking and serious vandalism.
Users of Drupal, one of the most popular content management systems, should consider their sites compromised if they didn't immediately apply a security patch released on Oct. 15.
Since 2011 a group of attackers has been targeting companies that operate industrial control systems with a backdoor program called BlackEnergy.
A coalition of security vendors has disrupted the activities of a sophisticated group of attackers tied to China that, over the past six years, infiltrated the computers of many Fortune 500 companies, journalists, environmental groups, software compa...
One of the first things a malware analyst does when encountering a suspicious executable file is to extract the text strings found inside it, because they can provide immediate clues about its purpose. This operation has long been considered safe, bu...
Network-attached storage (NAS) devices are riddled with vulnerabilities that can put the security of sensitive data and networks at risk, a researcher has found. To prove his point, he has created a proof-of-concept worm that can infect devices from ...
Isolating computers from the Internet, called "air gapping," is considered one of the best ways to defend critical systems and their sensitive data from cyberattacks, but researchers have found that can be undermined using an all-in-one printer.
A leaked programming manual for interacting with the physical components of automated teller machines might have helped attackers create malware programs that were used to steal cash from ATMs in various parts of the world this year.
Most Popular Reviews
- 1 Samsung's Galaxy Alpha review: A peek into the Galaxy S6
- 2 Samsung Galaxy Note 4 review: The busiest, biggest and best Samsung phablet
- 3 Aldi's $279 Bauhn Sphere review: Disappointing
- 4 Nokia Lumia 735 review: Perfectly ordinary
- 5 Bowers & Wilkins P5 (Series 2) review: For elegant sound
Best Deals on GoodGearGuide
Latest News Articles
- UK network BT mulls mobile return to fuel quad-play competition
- EU sees harmonizing telecoms and online content rules key to €315B economic growth plan
- Microsoft fingered as company forced to pay $136M in back taxes in China
- Kraken to help probe missing bitcoins in MtGox liquidation
- UN committee calls on countries to protect right to privacy
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTMarketing Solutions ManagerNSW
- FTSEO Content ExecutiveVIC
- FTDigital Account ManagerNSW
- FTAccount ExecutiveNSW
- FTStudio Design ManagerVIC
- FTStudio Design ManagerVIC
- CCStrategic Partner ManagerNSW
- FTProgram Manager - Integration & SolutionsNSW
- CCTech Support | IT Services Firm - Ad hoc Projects - Echuca AreaVIC
- FTPartnership Manager - MediaNSW
- CCTech Support | IT Services Firm - Ad hoc Projects - Port Augusta / Whyalla AreaSA