An unpatched vulnerability in the Google Admin application for Android can allow rogue applications to steal credentials that could be used to access Google for Work acccounts.
Google has released another patch for the Stagefright vulnerability after a security firm said the first one didn't fix it.
Three “high risk” vulnerabilities in SAP Mobile could give attackers access to encrypted information stored in mobile devices, security firm Onapsis reported Wednesday.
The developing world is increasingly using mobile banking apps to move money, but new research shows those apps are often poorly coded and pose security risks.
Responding to an accusatory blog post, BlackBerry has again denied that its embedded operating system caused the potentially dangerous vulnerability recently demonstrated in Chrysler Jeep Cherokees.
Many smart phone manufacturers preload remote support tools on their Android devices in an insecure way, providing a method for hackers to take control of the devices through rogue apps or even SMS messages.
Google, Samsung and LG will start to issue monthly security patches for Android devices, taking a cue from the PC industry after critical vulnerabilities put hundreds of millions of smartphone users at risk.
A malicious application or Web page could be used to crash Android devices, in some cases persistently, due to a vulnerability in a multimedia processing component.
The vast majority of Android phones can be hacked by sending them a specially crafted multimedia message (MMS), a security researcher has found.
Data stolen from Hacking Team continues to yield information about the company's infiltration techniques. The latest find is a fake Android news app, which was used to install its flagship surveillance tool.
It's become common practice to use virtual private networks for extra privacy and security in this era of mass surveillance, but a study published this week suggests such networks may not be as safe as they're commonly made out to be.
Apple released patches for several exploits that could allow maliciously crafted applications to destroy apps that already exist on devices, access their data or hijack their traffic, but a large number of iOS devices are still vulnerable.
The developers of a mobile app called Prized that secretly mined cryptocurrencies on people's mobile phones have settled with the U.S. Federal Trade Commission after being accused of deceptive trade practices.
A critical vulnerability is affecting 600 million Samsung devices including the company’s new flagship device, the S6.
Security remains a big concern for businesses considering cloud storage, but Dropbox hopes to further calm their fears by integrating its service with enterprise mobile management products.
Most Popular Reviews
- 1 Review: TCL C1 series 4K TV
- 2 Sony 75-inch UHD TV (X9400C) review: Sony and Android are a winning duo
- 3 LG 55EG960T OLED UHD TV
- 4 Panasonic Viera UHD TV review: good hardware, fragmented software
- 5 Microsoft Lumia 640 review: Honouring Nokia's legacy
Join the Good Gear Guide newsletter!
Best Deals on Good Gear Guide
Latest News Articles
- Seagate 8TB NAS drive: Review
- Seagate ST1000LX001 review
- Report: Microsoft could debut Xbox One game streaming stick and 'Xbox TV' at E3
- This sticker can wirelessly charge your smartphone or tablet
- Microsoft breaks own design rules in dupe-the-user Windows 10 upgrade tactic
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCSenior Change AnalystNSW
- CCSolutions Architect - SAP HANAQLD
- CCNetwork Consultant - Bandwidth Assessment | 3 month contract into Defence | NV1+ACT
- CCContract Analyst Programmer (.NET C#/MS ASP .NET) 160526/AP/263Asia
- CCSenior Systems AnalystSA
- CCRelease Manager, InfrastructureNSW
- CCBusiness AnalystACT
- FTOPEN_ASAP_Network Security AdministratorACT
- CCSAP Project ManagersNSW
- FTData EngineersNSW
- CCSystems Analyst (HTML/JAVA/Wireless & Mobile) 160525/SA/443Asia
- FTLinux System EngineersNSW
- CCProgram Business AnalystVIC
- FTLinux Infrastructure EngineerVIC
- CCSoftware Licensing AnalystVIC
- CCTransition Manager / Project ManagerQLD
- CCTest Analyst / Test LeadNSW
- FTSenior Developer (.Net)SA
- CCTechnical Business Analyst, SuperannuationNSW
- CCApplication Server AdminACT
- CCIT Program ManagerACT
- FTAgile CoachNSW
- CCContract Analyst Programmer (JAVA/SQL/Web) 160519/AP/453Asia
- CCSolution ArchitectNSW
- CCBusiness Intelligence (BI) AnalystQLD