Just four days after Adobe Systems patched a vulnerability in Flash Player, the exploit was adopted by cybercriminals for use in large-scale attacks. This highlights the increasingly small time frame users have to deploy patches.
Companies are finding it tough to keep out new types of banking malware, which continue to get better following the bar-raising threat known as Zeus.
A computer Trojan that hides its malicious code inside PNG image files counts healthcare organizations in the U.S. among its primary targets.
Several antivirus products from security firm ESET had a critical vulnerability that was easy to exploit and could lead to a full system compromise.
Adobe Systems released an emergency security update for Flash Player Tuesday to fix a critical vulnerability that has been exploited by a China-based cyberespionage group.
A critical vulnerability is affecting 600 million Samsung devices including the company’s new flagship device, the S6.
As cybercriminals employ increasingly sophisticated tactics to steal identities and data, and the costs and consequences of data breaches skyrocket, here are seven steps that your small business should be taking to insulate themselves from cyberattac...
Windows 10 will have a new mechanism that will allow software developers to integrate their applications with whatever antimalware programs exist on users' computers.
The group behind the Duqu cyberespionage tool has compromised at least two telecommunications operators and one electronic equipment manufacturer, in addition to a cybersecurity firm and venues that hosted high-level nuclear negotiations between worl...
A state-sponsored espionage group that uses a malware platform called Duqu has compromised the computer networks of several hotels and venues that hosted negotiations over Iran's nuclear program.
Police in several European countries arrested 49 suspected members of a gang they say broke into corporate email accounts, using them to divert payments from business customers.
A new malware program designed to steal payment card details from point-of-sale (PoS) systems is targeting businesses using Oracle Micros products.
The majority of 3G and 4G USB modems offered by mobile operators to their customers have vulnerabilities in their Web-based management interfaces that could be exploited remotely when users visit compromised websites.
Cybercriminals are targeting employees who browse the Web or check their email from point-of-sale (PoS) computers, a risky but unfortunately common practice.
The shamelessness of ransomware pushers knows no bounds. After encrypting people's files and then holding them to ransom, they portray themselves as service providers offering technical support and discounts to their "customers."
Most Popular Reviews
- 1 2016 Ford Mustang EcoBoost review
- 2 Synology DS216+ Review
- 3 Review: TCL C1 series 4K TV
- 4 Sony 75-inch UHD TV (X9400C) review: Sony and Android are a winning duo
- 5 LG 55EG960T OLED UHD TV
Join the Good Gear Guide newsletter!
Best Deals on Good Gear Guide
Latest News Articles
- Apple has sold 1 billion iPhones
- Pokémon Go craze shows Apple an augmented reality future
- Samsung’s massive 15TB SSD can be yours -- for about $10K
- Warning: The new Marvel: Ultimate Alliance PC ports are a disastrous mess
- After delays, Lenovo finally ships its first OLED laptop
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTSocial Media AssistantQLD
- CCIT/Telco Graduate | 12mth ContractVIC
- CCSenior Security SpecialistNSW
- FT1st Level IT Support - Microsoft EnvironmentNSW
- CCCRM Technical Consultant / DeveloperNSW
- CC.NET DeveloperQLD
- CCSenior Process Analyst - Sydney CBDNSW
- FTBusiness Intelligence - Policy and Governance ManagerNSW
- FTChange and Release ManagerVIC
- CCProject ManagerACT
- CCeLearning Developer / Learning Management System AdministratorACT
- FTApplications Support / Systems Administrator | DefenceACT
- CCHR Contractor Retail ProjectVIC
- CCService Lead - Cloud hosting and storageNSW
- CCSolution Architect - Supply ChainNSW
- CCStrategic Business AnalystNSW
- FTInfrastructure Technology Platform ManagerVIC
- CCContract Analyst Programmer (J2EE) 160721/AP/075Asia
- FTSystems Administrator | Defence | NV1 / NV2 clearedACT
- FTIT Helpdesk (Microsoft)NSW
- CCCommunication LeadVIC
- CCDatabase AdministratorNSW
- FTSAS Support SpecialistNSW
- FTFull Stack DeveloperNSW
- CCTechnical Architect - CloudNSW