For the first time since Stuxnet was discovered in 2010, researchers have publicly named the worm's original victims: five Iranian companies involved in industrial automation.
A multi-year study of cyberattacks against 10 activist and human rights groups shows they're hit with the same types of intrusions as large organizations but have far fewer resources to defend themselves.
For the past four years a group of sophisticated hackers has compromised the networks of luxury hotels to launch malware attacks against corporate executives and entrepreneurs traveling on business in the Asia-Pacific region.
Attackers have used rogue applications for both OS X and Windows to infect iPhones and iPads in China with a malware program that steals contact information and other private data.
Home Depot has shed more light on a recent data breach that compromised 56 million payment cards, saying hackers used login credentials belonging to another company to access its network. It also revealed that 53 million email addresses were also sto...
Apple has acted quickly to address a malware threat to iOS and Mac OSX computers, saying Thursday it has blocked apps from running that are infected with the WireLurker malicious code.
There's a scary new piece of malware that collects call logs, phone-book contacts and other sensitive information from Apple iPhones and iPads. Should you be worried?
A security researcher has developed a tool to demonstrate how the unauthenticated data packets in the 802.11 wireless LAN protocol can be used as a covert channel to control malware on an infected computer.
Researchers at Palo Alto Networks said they've discovered an impressive malware attack against Apple devices, which for now appears to be limited to users of a Chinese application store.
A recent piece of malware that aims to steal your online banking credentials revives a decade-old technique to install itself on your PC.
Apple's security technologies for Mac OS X may still miss iWorm, a piece of malware discovered in late September that infected thousands of computers.
A cyberespionage group that has built its operations around a malware program called BlackEnergy has been compromising routers and Linux systems based on ARM and MIPS architectures in addition to Windows computers.
Since 2011 a group of attackers has been targeting companies that operate industrial control systems with a backdoor program called BlackEnergy.
A coalition of security vendors has disrupted the activities of a sophisticated group of attackers tied to China that, over the past six years, infiltrated the computers of many Fortune 500 companies, journalists, environmental groups, software compa...
Russia is likely behind a long-running computer spying campaign, although the stealthy attacks leave fewer clues than other state-sponsored attacks, according to a new report from FireEye.
Most Popular Reviews
- 1 Sony Xperia Z3 review: The no-frills flagship
- 2 Samsung's Galaxy Alpha review: A peek into the Galaxy S6
- 3 Samsung Galaxy Note 4 review: The busiest, biggest and best Samsung phablet
- 4 Aldi's $279 Bauhn Sphere review: Disappointing
- 5 Nokia Lumia 735 review: Perfectly ordinary
Best Deals on GoodGearGuide
Latest News Articles
- Exploits for dangerous network time protocol vulnerabilities can compromise systems
- Google Android One phones to sell in three more Asian countries
- Tor warns of possible disruption of network through server seizures
- Sony looking for ways to distribute 'The Interview' online
- Sony hack was 'cyber vandalism,' not act of war, says Obama
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.