Keylogging malware that may have been used by the NSA shares signficant portions of code with a component of Regin, a sophisticated platform that has been used to spy on businesses, government institutions and private individuals for years.
Adobe Systems started pushing a critical Flash Player patch to users who have auto-update enabled over the weekend in order to fix a vulnerability that has been exploited by attackers since last week.
Emergency updates for Flash Player released Thursday fix a vulnerability that is actively exploited by attackers, but leave a separate one unpatched.
Attackers are using compromised websites to exploit a new and currently unpatched vulnerability in Flash Player, a malware researcher has reported.
The number of exploit kits on the Web dramatically decreased last year, but some have become more sophisticated and shifted their focus to software that is less frequently updated.
In addition to having its own arsenal of digital weapons, the U.S. National Security Agency reportedly hijacks and repurposes third-party malware.
Attackers have started distributing a new and improved version of the CryptoWall file-encrypting ransomware program over the past few days, security researchers warn.
Users who visited the site of the state-run North Korean news agency, to see the country's response to the Sony hacking accusations or for other reasons, might want to scan their computers for malware.
Several photo, video and other media editing programs from software maker Corel contain DLL hijacking vulnerabilities that could allow attackers to execute malicious code on users' computers.
CryptoWall, one of a family of malware programs that encrypts files and demands a ransom from victims, has undergone a revamp that is frustrating security researchers.
For the past several months, different groups of attackers have distributed malware through Microsoft Office documents that contain malicious macros, reviving a technique that has been out of style for over a decade.
Microsoft says German speakers are being targeted by a new variant of a powerful type of malware that steals online banking credentials.
AOL.com said Tuesday it has stopped malicious advertisements being served by its advertising platforms after being alerted by a security company.
Attackers can infect MacBook computers with highly persistent boot rootkits by connecting malicious devices to them over the Thunderbolt interface.
A sophisticated group of cybercriminals has stolen over US$25 million by hacking into the infrastructure of numerous financial institutions in Russia and former Soviet Union countries, as well as into point-of-sale systems belonging to U.S. and Europ...
Most Popular Reviews
- 1 Motorola Moto X (2nd Gen) review: Raising the bar
- 2 Xiaomi Mi4 review: Xiaomi's best yet
- 3 Samsung Galaxy Note Edge review: Lightly flawed, Undeniably special
- 4 Sony Xperia Z3 review: The no-frills flagship
- 5 Samsung's Galaxy Alpha review: A peek into the Galaxy S6
Best Deals on GoodGearGuide
Latest News Articles
- How three small credit card transactions could reveal your identity
- Citrix's 900 job cuts seen as 'defensive' move
- Amazon returns to profit as holiday sales soar
- Uber passenger who alleged Delhi rape sues in US
- Microsoft said to invest in Android maker Cyanogen
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.