Users who accessed some stories on the Reuters website Sunday were redirected to a message from hackers criticizing the news agency's coverage of Syria.
A new tool called the Modern Honey Network (MHN) aims to make deploying and managing large numbers of honeypots easier so that enterprises can adopt such systems as part of their active defense strategies.
A code-hosting and project management services provider was forced to shut down operations indefinitely after a hacker broke into its cloud infrastructure and deleted customer data, including most of the company's backups.
A hacker exploited publicly known vulnerabilities to install malware on network-attached storage systems manufactured by Synology and used their computing power to generate Dogecoins, a type of cryptocurrency.
A Chinese hacking group that has attacked U.S. and European aerospace and communications companies is almost certainly linked to the Chinese military, a U.S. Internet security company said Monday.
Many servers expose insecure management interfaces to the Internet through microcontrollers embedded into the motherboard that run independently of the main OS and provide monitoring and administration functions.
Customers of storage and networking equipment manufacturer Buffalo who downloaded certain files from the company's website in Japan last week might have had their computers infected with an online banking Trojan.
A serious vulnerability that could be exploited to crash TLS clients and potentially execute malicious code on underlying systems was patched in the popular GnuTLS cryptographic library.
The GPRS Roaming Exchange (GRX) network, which carries roaming traffic among hundreds of mobile operators worldwide, contains Internet-reachable hosts that run vulnerable and unnecessary services, recent security scans reveal.
The Secure Boot security mechanism of the Unified Extensible Firmware Interface (UEFI) can be bypassed on around half of computers that have the feature enabled in order to install bootkits, according to a security researcher.
Inexpensive equipment can be used to disrupt vessel-tracking systems and important communications between ships and port authorities, according to two security researchers.
eBay's security team isn't going to get a break for a while.
Prague-based antivirus company, Avast, said, on Monday, it took its community forum offline after a data breach, but payment information was not compromised.
Security researchers uncovered a global cybercriminal operation that infected with malware almost 1,500 point-of-sale (POS) terminals, accounting systems and other retail back-office platforms from businesses in 36 countries.
A third of data breaches investigated by security firm Trustwave last year involved compromises of point-of-sale (PoS) systems and over half of all intrusions targeted payment card data.
Most Popular Reviews
- 1 Microsoft Lumia 640 review: Honouring Nokia's legacy
- 2 Samsung SUHD smart TV (JS9500) review
- 3 Samsung Galaxy S6 Edge review: Return to Glory
- 4 Samsung Galaxy S6 (32GB) review: Simply, the best Samsung Galaxy
- 5 LG 55-inch curved OLED (55EC930T) TV review: The future of OLED is bright
Join the Good Gear Guide newsletter!
Best Deals on GoodGearGuide
Latest News Articles
- US Senate blocks NSA surveillance reform bill
- Amazon rules Gartner's magical box
- Google gives Android developers new tools for tracking app performance
- US Senate leader pushes to extend NSA phone dragnet
- Pebble Time smartwatch to begin shipping on May 27
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTSenior Digital B2B Sales Manager | Household BrandNSW
- CCMobile Designer / Developer - IOSNSW
- FTApplication Security SpecialistNSW
- FTKey Account ManagerNSW
- FTSENIOR FORMS ANALYST (13767)QLD
- CCMobile Designer / Developer - IOSNSW
- FTSenior Sales Executive X 3 World Leading Music Streaming PlatformNSW
- FTSMB Direct Sales Account Executive | Largest Global Online MarketplaceNSW
- FTSenior SQL DBANSW