Just four days after Adobe Systems patched a vulnerability in Flash Player, the exploit was adopted by cybercriminals for use in large-scale attacks. This highlights the increasingly small time frame users have to deploy patches.
Companies are finding it tough to keep out new types of banking malware, which continue to get better following the bar-raising threat known as Zeus.
A computer Trojan that hides its malicious code inside PNG image files counts healthcare organizations in the U.S. among its primary targets.
Several antivirus products from security firm ESET had a critical vulnerability that was easy to exploit and could lead to a full system compromise.
Adobe Systems released an emergency security update for Flash Player Tuesday to fix a critical vulnerability that has been exploited by a China-based cyberespionage group.
A critical vulnerability is affecting 600 million Samsung devices including the company’s new flagship device, the S6.
As cybercriminals employ increasingly sophisticated tactics to steal identities and data, and the costs and consequences of data breaches skyrocket, here are seven steps that your small business should be taking to insulate themselves from cyberattac...
Windows 10 will have a new mechanism that will allow software developers to integrate their applications with whatever antimalware programs exist on users' computers.
The group behind the Duqu cyberespionage tool has compromised at least two telecommunications operators and one electronic equipment manufacturer, in addition to a cybersecurity firm and venues that hosted high-level nuclear negotiations between worl...
A state-sponsored espionage group that uses a malware platform called Duqu has compromised the computer networks of several hotels and venues that hosted negotiations over Iran's nuclear program.
Police in several European countries arrested 49 suspected members of a gang they say broke into corporate email accounts, using them to divert payments from business customers.
A new malware program designed to steal payment card details from point-of-sale (PoS) systems is targeting businesses using Oracle Micros products.
The majority of 3G and 4G USB modems offered by mobile operators to their customers have vulnerabilities in their Web-based management interfaces that could be exploited remotely when users visit compromised websites.
Cybercriminals are targeting employees who browse the Web or check their email from point-of-sale (PoS) computers, a risky but unfortunately common practice.
The shamelessness of ransomware pushers knows no bounds. After encrypting people's files and then holding them to ransom, they portray themselves as service providers offering technical support and discounts to their "customers."
Most Popular Reviews
- 1 Mazda MX-5 (2016) review: Absolute driving purity
- 2 Sony 75-inch UHD TV (X9400C) review: Sony and Android are a winning duo
- 3 LG 55EG960T OLED UHD TV
- 4 Panasonic Viera UHD TV review: good hardware, fragmented software
- 5 Microsoft Lumia 640 review: Honouring Nokia's legacy
Join the Good Gear Guide newsletter!
Best Deals on Good Gear Guide
Latest News Articles
- Kogan Mobile upgrades to 4G network
- Review: TCL C1 series 4K TV
- Which flagship TV is best? Sony 4K HDR Bravia 2016 versus LG 4K HDR OLED 2016
- MIT uses 4D maps to help robot teams navigate moving obstacles
- A new AMD licensing deal could create more x86 rivals for Intel
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTGraduate IT Administration SupportVIC
- FTSolution Architect (Guidewire Billing Center)NSW
- FTSenior Middleware Lead Shared Services (Support and EngineeringVIC
- CCProject Specialist - Contact Center and Unified CommunicationsVIC
- CCService DeskWA
- CCICT Project Manager - Contact Centre/Telephony FocusNSW
- CCSenior Technical WriterVIC
- FTSQL DeveloperNSW
- FTProduct OwnerNSW
- CCTechnical ExpertVIC
- CCProduct SpecialistVIC
- CCChange Lead/Senior Change Analyst - Transformation projectNSW
- CCAdobe Experience Manager AEM / CQ5 DeveloperNSW
- FTTechnical/Solutions ArchitectNSW
- CCContract Contract Junior Programmer (JUD-16493-4)Asia
- FTSenior Revenue Systems Functional AnalystSA
- CCSiebel AnalystACT
- FTSenior Project Manager - Payroll IntegrationVIC
- CCJava Developer (front end)WA
- FTProduction ConsultantVIC
- CCSql Server Database Administrator (SAP)QLD
- CCNV1 | System admin with SQL server experience for Defence Application SupportACT
- FTHands-on Service Desk Team Lead | Blackburn | Managed Service ProviderVIC
- CCFull Stack Developers - JavaNSW
- CCChange ManagerNSW