Attackers are using fake versions of a recently released report about a Chinese cyberespionage group as bait in new spear-phishing attacks that target Japanese and Chinese users.
The administrators of a popular iOS developer Web forum called iPhoneDevSDK confirmed Wednesday that it had been compromised by hackers who used it to launch attacks against its users. Security experts believe the site served as a gateway for the rec...
A recently found exploit that bypasses the sandbox anti-exploitation protection in Adobe Reader 10 and 11 is highly sophisticated and is probably part of an important cyberespionage operation, the head of the malware analysis team at antivirus vendor...
Devices used by many radio and TV stations to broadcast emergency messages as part of the U.S. Emergency Alert System (EAS) contain critical vulnerabilities that expose them to remote hacker attacks, according to researchers from security consultancy...
Researchers from security firm FireEye claim that attackers are actively using a remote code execution exploit that works against the latest versions of Adobe Reader 9, 10 and 11.
McAfee is enhancing its business security platform by adding near real-time querying capabilities to its ePolicy Orchestrator software and by integrating it with its security information and event management (SIEM) product to automatically initiate e...
Security vendor Bit9 promised to release limited details of a hack caused by a failure of the company to install the same security software on its own network that it sells to a handful of Fortune 500 companies.
The U.S. Department of Energy said Monday that personal information about several hundred employees and contractors was stolen in a mid-January hack, but that no classified information was compromised.
Security researchers from Croatia-based security firm DefenseCode claim to have found a critical remote code execution vulnerability in the UPnP (Universal Plug and Play) implementation developed by Broadcom and used by many routers with Broadcom chi...
The Wall Street Journal said Thursday it had been targeted by hackers trying to monitor the newspaper's coverage of China, less than a day after a similar revelation from its competitor The New York Times.
Hackers from China breached the computer network of The New York Times and stole passwords that allowed them to gain access to computers and email accounts for a period of four months, the newspaper reported late Wednesday.
A new Trojan program that displays rogue advertisements during browsing sessions uses a DNS-based email validation protocol called the Sender Policy Framework (SPF) in order to receive instructions from attackers without being detected, according to ...
Hackers working under the name of the Anonymous hacktivist collective hit a US government website on Saturday, replacing its home page with a 1340 word text detailing its frustrations with the way the American legal system works and a threat to relea...
A variety of networking and security appliances from Barracuda Networks contain backdoor accounts that could allow attackers to log in remotely over SSH (Secure Shell) and gain administrative, or root, access on the devices.
A group of hackers that are infecting Web servers with rogue Apache modules are also backdooring their Secure Shell (SSH) services in order to steal login credentials from administrators and users.
Latest News Articles
- Jawbone Mini Jambox Bluetooth speaker
- Lego Marvel Super Heroes (Xbox One)
- Foxtel Play screens on LG Smart TVs
- Home appliance makers connect with open source 'Internet of things' project
- Rambus, Micron settle patent, antitrust disputes
Most Popular Articles
- 1 How to update your Samsung Galaxy S4 to Android 4.3 Google Edition
- 2 Aldi's new budget 8in Android tablet has 3G, makes phone calls
- 3 Tethering tutorial: How to use your iPhone as a modem
- 4 Capacitive vs resistive touchscreens
- 5 Aldi's new budget Android smartphone isn't very good value
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
Best Deals on GoodGearGuide
Best Deals on PCWorld
- TabletsView all »
- NotebooksView all »
- Mobile PhonesView all »
- Printers & ScannersView all »
- Networking, Wireless & VoIPView all »