The leaked files from surveillance software maker Hacking Team have proven to be a great resource for cyberespionage groups, which have used at least two Flash Player exploits from the company's arsenal.
Data stolen from Hacking Team continues to yield information about the company's infiltration techniques. The latest find is a fake Android news app, which was used to install its flagship surveillance tool.
Cybercriminals are casting increasingly wider nets in their search for new point-of-sale systems to infect. This appears to be the case with a new memory scraping malware program called GamaPoS that's distributed by a large botnet known as Andromeda.
Surveillance software maker Hacking Team has provided its government customers with the ability to infect the low-level firmware found in laptops and other computers that they wanted to spy on.
A sophisticated group of hackers known for targeting military, government and media organizations is currently using an exploit for a vulnerability in Java that hasn't been patched by Oracle.
Recently breached surveillance software maker, Hacking Team, had access to three different exploits for previously unknown vulnerabilities in Flash Player. All of them are now out in the open, putting Internet users at risk.
The huge cache of files recently leaked from Italian surveillance software maker Hacking Team is the gift that keeps on giving for attackers. Researchers sifting through the data found a new exploit for a previously unknown vulnerability in Adobe's F...
The hackers that targeted Twitter, Facebook, Apple and Microsoft developers two years ago have escalated their economic espionage efforts as they seek confidential business information and intellectual property they can profit from.
It took just a day for cybercriminals to start using a new and yet-to-be-patched Flash Player exploit that was leaked from a surveillance software developer.
A new family of Android malware adds insult to injury by making users pay for the data-stealing application.
Researchers sifting through 400GB of data recently leaked from Hacking Team, an Italian company that sells computer surveillance software to government agencies from around the world, have already found an exploit for an unpatched vulnerability in Fl...
The Internet could see a new wave of botnets based on the ZeusVM banking Trojan after the tools needed to build and customize the malware program were published online for free.
Someone call the malware antitrust commission: Recent versions of the Kovter ad fraud Trojan, which infects computers through Web-based exploits, close the door after themselves by updating Flash Player to the latest version.
Apple released patches for several exploits that could allow maliciously crafted applications to destroy apps that already exist on devices, access their data or hijack their traffic, but a large number of iOS devices are still vulnerable.
The developers of a mobile app called Prized that secretly mined cryptocurrencies on people's mobile phones have settled with the U.S. Federal Trade Commission after being accused of deceptive trade practices.
Most Popular Reviews
- 1 2016 Ford Mustang EcoBoost review
- 2 Synology DS216+ Review
- 3 Review: TCL C1 series 4K TV
- 4 Sony 75-inch UHD TV (X9400C) review: Sony and Android are a winning duo
- 5 LG 55EG960T OLED UHD TV
Join the Good Gear Guide newsletter!
Best Deals on Good Gear Guide
Latest News Articles
- Windows 10's big Anniversary Update will hit phones the same time as PCs
- Hands-on with Pokémon Go: Catch 'em all by exploring the real world
- The Assembly hands-on: The future of VR is adventure games
- EC Technology Foldable Bluetooth Keyboard review: This Jorno clone can save you a few bucks
- ZAGG Pocket Keyboard review: Little annoyances keep it out of contention
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCMidrange Technical ArchitectQLD
- FTContinuous delivery application deployment automation specialist (DevOps)NSW
- FTBusiness Analyst/Data Analyst Capability ManagerVIC
- CCSenior Project Coordinator - Large Telco - URGENTNSW
- CCLinux Systems AdministratorVIC
- CCTechnical Writer | Experimental military technology | NV1ACT
- FTEnterprise Technology Platform ManagerVIC
- CCContract Analyst Programmer (J2EE/Oracle) 160704/AP/601Asia
- FTNV2 Defence Project ManagerACT
- CCSenior Systems AnalystACT
- FTTechnical Services ManagerACT
- FTIT Support Analyst (Renewal Contract)Asia
- FTSolution Architect - Data/ InformationVIC
- CCSystems Engineer / Applications Scripting DeveloperSA
- CCAgile Business AnalystNSW
- FTEnvironment ManagerVIC
- CCIntegration ArchitectNSW
- CCDigital Business AnalystVIC
- CCICT PreSales SpecialistVIC
- CCProject DirectorWA
- CCOffice 365 Project ManagerNSW
- CCHybrid Mobile App DeveloperNSW
- CCSystems EngineerNSW
- CCSecurity Engineer - SUMO focusNSW
- CCMiddleware Developer - BaselineACT