Just four days after Adobe Systems patched a vulnerability in Flash Player, the exploit was adopted by cybercriminals for use in large-scale attacks. This highlights the increasingly small time frame users have to deploy patches.
Companies are finding it tough to keep out new types of banking malware, which continue to get better following the bar-raising threat known as Zeus.
A computer Trojan that hides its malicious code inside PNG image files counts healthcare organizations in the U.S. among its primary targets.
Several antivirus products from security firm ESET had a critical vulnerability that was easy to exploit and could lead to a full system compromise.
Adobe Systems released an emergency security update for Flash Player Tuesday to fix a critical vulnerability that has been exploited by a China-based cyberespionage group.
A critical vulnerability is affecting 600 million Samsung devices including the company’s new flagship device, the S6.
As cybercriminals employ increasingly sophisticated tactics to steal identities and data, and the costs and consequences of data breaches skyrocket, here are seven steps that your small business should be taking to insulate themselves from cyberattac...
Windows 10 will have a new mechanism that will allow software developers to integrate their applications with whatever antimalware programs exist on users' computers.
The group behind the Duqu cyberespionage tool has compromised at least two telecommunications operators and one electronic equipment manufacturer, in addition to a cybersecurity firm and venues that hosted high-level nuclear negotiations between worl...
A state-sponsored espionage group that uses a malware platform called Duqu has compromised the computer networks of several hotels and venues that hosted negotiations over Iran's nuclear program.
Police in several European countries arrested 49 suspected members of a gang they say broke into corporate email accounts, using them to divert payments from business customers.
A new malware program designed to steal payment card details from point-of-sale (PoS) systems is targeting businesses using Oracle Micros products.
The majority of 3G and 4G USB modems offered by mobile operators to their customers have vulnerabilities in their Web-based management interfaces that could be exploited remotely when users visit compromised websites.
Cybercriminals are targeting employees who browse the Web or check their email from point-of-sale (PoS) computers, a risky but unfortunately common practice.
The shamelessness of ransomware pushers knows no bounds. After encrypting people's files and then holding them to ransom, they portray themselves as service providers offering technical support and discounts to their "customers."
Most Popular Reviews
- 1 Review: TCL C1 series 4K TV
- 2 Sony 75-inch UHD TV (X9400C) review: Sony and Android are a winning duo
- 3 LG 55EG960T OLED UHD TV
- 4 Panasonic Viera UHD TV review: good hardware, fragmented software
- 5 Microsoft Lumia 640 review: Honouring Nokia's legacy
Join the Good Gear Guide newsletter!
Best Deals on Good Gear Guide
Latest News Articles
- 10 things you need to know about Intel's crazy 10-core Broadwell-E CPU
- Ballistix demonstrates first NVMe drive performance at Computex
- Computex: SSD makers who don't make U.2 SSDs say U.2 is 'dead on arrival' but motherboard maker shows otherwise
- 100 illuminated Intel drones to perform at Vivid Sydney
- Intel beefs up VR ammo with Extreme Edition Core i7 chips
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCBusiness Analyst, ReportingNSW
- FTSenior Developer (Full stack)SA
- FTInfrastructure Specialist - Sec Ops Network & OSAsia
- CCChange manager/Change LeadNSW
- CCSoftware Licensing AnalystVIC
- CCProjects Resource/ Workforce ManagerVIC
- CCProgram Communications SpecialistVIC
- CCSenior Process AnalystVIC
- CCSenior Automation & Performance EngineerVIC
- CCService Desk ConsultantACT
- CCTechnology Team Lead / Senior Developer - JavaNSW
- CCBusiness Analyst, AdviceNSW
- FTOPEN_ASAP_Network Security AdministratorACT
- CCSenior BA - Enterprise DataNSW
- CCInteractional Designer-Adobe Creative Cloud, SketchNSW
- CCOracle Application Administrator - July startACT
- CCApplication System EngineerACT
- CCSnr Technical System Engineer (IBM/Oracle/SQL) 160524/STSE/vmtAsia
- FTWeb DeveloperSA
- FTMid-Level Full-Stack Java DeveloperVIC
- CCSenior Business Analyst - Integration Solution ManagementVIC
- FTScrum MasterVIC
- CCMS SCOM AdministratorVIC
- CCSQL DeveloperNSW
- CCBig Data DeveloperWA