Just four days after Adobe Systems patched a vulnerability in Flash Player, the exploit was adopted by cybercriminals for use in large-scale attacks. This highlights the increasingly small time frame users have to deploy patches.
Companies are finding it tough to keep out new types of banking malware, which continue to get better following the bar-raising threat known as Zeus.
A computer Trojan that hides its malicious code inside PNG image files counts healthcare organizations in the U.S. among its primary targets.
Several antivirus products from security firm ESET had a critical vulnerability that was easy to exploit and could lead to a full system compromise.
Adobe Systems released an emergency security update for Flash Player Tuesday to fix a critical vulnerability that has been exploited by a China-based cyberespionage group.
A critical vulnerability is affecting 600 million Samsung devices including the company’s new flagship device, the S6.
As cybercriminals employ increasingly sophisticated tactics to steal identities and data, and the costs and consequences of data breaches skyrocket, here are seven steps that your small business should be taking to insulate themselves from cyberattac...
Windows 10 will have a new mechanism that will allow software developers to integrate their applications with whatever antimalware programs exist on users' computers.
The group behind the Duqu cyberespionage tool has compromised at least two telecommunications operators and one electronic equipment manufacturer, in addition to a cybersecurity firm and venues that hosted high-level nuclear negotiations between worl...
A state-sponsored espionage group that uses a malware platform called Duqu has compromised the computer networks of several hotels and venues that hosted negotiations over Iran's nuclear program.
Police in several European countries arrested 49 suspected members of a gang they say broke into corporate email accounts, using them to divert payments from business customers.
A new malware program designed to steal payment card details from point-of-sale (PoS) systems is targeting businesses using Oracle Micros products.
The majority of 3G and 4G USB modems offered by mobile operators to their customers have vulnerabilities in their Web-based management interfaces that could be exploited remotely when users visit compromised websites.
Cybercriminals are targeting employees who browse the Web or check their email from point-of-sale (PoS) computers, a risky but unfortunately common practice.
The shamelessness of ransomware pushers knows no bounds. After encrypting people's files and then holding them to ransom, they portray themselves as service providers offering technical support and discounts to their "customers."
Most Popular Reviews
- 1 2016 Ford Mustang EcoBoost review
- 2 Review: TCL C1 series 4K TV
- 3 Sony 75-inch UHD TV (X9400C) review: Sony and Android are a winning duo
- 4 LG 55EG960T OLED UHD TV
- 5 Panasonic Viera UHD TV review: good hardware, fragmented software
Join the Good Gear Guide newsletter!
Best Deals on Good Gear Guide
Latest News Articles
- Review: Arcam MusicBoost for iPhone 6 and 6S
- How to reinstall Windows like a pro
- Huawei P9 review: lifting photography to another level... sometimes.
- If Tim Burton made a robot, this would be it
- Here's how NASCAR is digitizing race day
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCJava DevelopersACT
- CCHybrid Mobile App DeveloperNSW
- CCContract System Analyst (Renewable Contract)Asia
- FTSolution Architect - Data/ InformationVIC
- CCSenior Change Manager, Financial ServicesNSW
- CCProject Scheduler - IT Security ProgramNSW
- CCService Desk ConsultantVIC
- FTTableau BI DeveloperNSW
- CCChange ManagerNSW
- FTProject Coordinator / AdministratorNSW
- CCContract Programmer (IT Security/Website Admin) 160617/P/564Asia
- CCInside Sales Specialist / Customer Service - TelecommunicationsNSW
- FTSystems application support analystNSW
- FTIT Support Analyst (Renewal Contract)Asia
- FTSenior Architect, TechnologyNSW
- FTJava DeveloperAsia
- CCData ArchitectSA
- FTData Center Operator (1-Year Renewal Contract)Asia
- CCBusiness Analyst - BPRNSW
- CCSecurity Solution ArchitectQLD
- FTEnvironments Lead (Linux/ Automation)VIC
- CCContract Analyst Programmer (J2EE/Oracle) 160704/AP/601Asia
- CCDigital Business AnalystVIC
- FTTechnical Services ManagerACT
- CCLead Communications ConsultantWA