The Wall Street Journal said Thursday it had been targeted by hackers trying to monitor the newspaper's coverage of China, less than a day after a similar revelation from its competitor The New York Times.
Hackers from China breached the computer network of The New York Times and stole passwords that allowed them to gain access to computers and email accounts for a period of four months, the newspaper reported late Wednesday.
A new Trojan program that displays rogue advertisements during browsing sessions uses a DNS-based email validation protocol called the Sender Policy Framework (SPF) in order to receive instructions from attackers without being detected, according to ...
Hackers working under the name of the Anonymous hacktivist collective hit a US government website on Saturday, replacing its home page with a 1340 word text detailing its frustrations with the way the American legal system works and a threat to relea...
A variety of networking and security appliances from Barracuda Networks contain backdoor accounts that could allow attackers to log in remotely over SSH (Secure Shell) and gain administrative, or root, access on the devices.
A group of hackers that are infecting Web servers with rogue Apache modules are also backdooring their Secure Shell (SSH) services in order to steal login credentials from administrators and users.
Microsoft vowed on Wednesday to improve two of its security products after both failed to pass an evaluation by a Germany security software testing organization.
6Scan, a Web security startup based in Tel Aviv, Israel, launched a new service on Tuesday that can scan websites for security issues, like vulnerabilities and malware infections, and allows their owners to automatically fix the identified problems.
The hundreds of government, military and research organizations targeted in a large-scale cyberespionage operation dubbed Red October were not only attacked using malicious Excel and Word documents as previously believed, but also by using Web-based ...
Unidentified attackers stole sensitive information from hundreds of diplomatic, government, research and military organizations from around the world as part of a newly uncovered cyberespionage campaign that started nearly six years ago. The operatio...
The Dutch government's cyber security center has published guidelines that it hopes will encourage ethical hackers to disclose security vulnerabilities in a responsible way.
Security researchers from antivirus vendor Trend Micro have uncovered a piece of backdoor-type malware that infects Java-based HTTP servers and allows attackers to execute malicious commands on the underlying systems.
A power station in the south of Iran has been hit by a cyberattack, an Iranian news agency reported Tuesday, citing a local civil defense official. But now agency and official are in dispute over whether he really made the remarks.
Western Connecticut State University said Thursday that a vulnerability in its computer system present for more than three years may have exposed the data of 233,880 students and other people affiliated with the institution.
The Romanian domain names of Google, Yahoo, Microsoft, Kaspersky Lab and other companies were hijacked on Wednesday and were redirected to a hacked server in the Netherlands.
Most Popular Reviews
- 1 Samsung's Galaxy Alpha review: A peek into the Galaxy S6
- 2 Samsung Galaxy Note 4 review: The busiest, biggest and best Samsung phablet
- 3 Aldi's $279 Bauhn Sphere review: Disappointing
- 4 Nokia Lumia 735 review: Perfectly ordinary
- 5 Bowers & Wilkins P5 (Series 2) review: For elegant sound
Best Deals on GoodGearGuide
Latest News Articles
- Uber suspends Nevada operations, affecting nearly 1,000 jobs
- Sony confirms development of e-paper smartwatch
- My gripe with Apple’s iPhones
- Weather.com fixes web application vulnerabilities
- Early version of new POS malware family spotted
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCTech Support | IT Services Firm - Ad hoc Projects - Port Augusta / Whyalla AreaSA
- FTStudio Design ManagerVIC
- CCTech Support | IT Services Firm - Ad hoc Projects - Echuca AreaVIC
- FTSEO Content ExecutiveVIC
- FTAccount ExecutiveNSW
- FTProgram Manager - Integration & SolutionsNSW
- FTDigital Account ManagerNSW
- FTPartnership Manager - MediaNSW