Next time you turn off your Android phone, you might want take the battery out just to be certain.
VirusTotal, a Google-owned online malware scanning service, is creating a whitelist of products from large software vendors to reduce bad detections by antivirus programs.
Security-conscious IT leaders already have a rocky romance with the BYOD trend, and as Valentine's day approaches it's emerged that lonely-heart employees could be putting company data up for grabs by using dating apps.
A team of hackers that target governments, the military and journalists has turned its attention to the iPhone, according to Trend Micro.
Google has done a good job at keeping data-stealing Trojan apps out of Google Play, but attackers still find ways to monetize rogue apps through the store.
When restrictive IT policies push employees to personal smartphone apps to share corporate data, the security of that information is at risk. On Wednesday, MobileIron will release an update to its Content Security Service that seeks to plug that hole...
Samsung Electronics and Good Technology hope to convince more enterprises to use Android-based smartphones and tablets, with the help of a joint offering designed to protect the OS, applications and data.
The SilentText secure messaging application bundled with Blackphone had a serious vulnerability that would have allowed attackers to decrypt messages, read contact information, gather location data and even execute malicious code on the phone.
Samsung Electronics smartphones and tablets protected using the company's Knox security technology have been integrated with VPNs from Cisco Systems, giving enterprises more options for communicating securely.
A vulnerability in the IBM Endpoint Manager for mobile devices could allow attackers to execute malicious code on the servers used by companies to manage devices.
An Android Trojan program that's behind one of the longest running multipurpose mobile botnets has been updated to become stealthier and more resilient.
Android users in Melbourne’s CBD are the most at risk sector of the community for malware threats according to a report released by F-secure.
Security researchers have discovered a vulnerability in iPhones and iPads that allows attackers to install fake apps that take the place of legitimate ones.
Attackers have used rogue applications for both OS X and Windows to infect iPhones and iPads in China with a malware program that steals contact information and other private data.
There's a scary new piece of malware that collects call logs, phone-book contacts and other sensitive information from Apple iPhones and iPads. Should you be worried?
Most Popular Reviews
- 1 Evapolar USB air conditioner review
- 2 Hisense Series 7 ULED 4K UHD TV review
- 3 LED Lenser P7R Professional Torch review
- 4 Aftershokz Wireless Trekz Titanium Bone Conduction Bluetooth Headphones review
- 5 Review: Periscope users rejoice with Feiyu’s G4 Plus 3-Axis Gimbal for Smartphone video
Join the Good Gear Guide newsletter!
Latest News Articles
- Linksys EA9500 Max-Stream AC5400 MU-MIMO Gigabit router review
- Paris motor show turns on to electric cars
- Israeli startup says its new software would have prevented Tesla hack
- Microsoft moves Cortana and Bing into Microsoft Research to accelerate new features
- Google Maps for Android adds 'OK Google' voice, navigation commands and other search tricks
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCFull Stack Application Developer - IoT projectsVIC
- FTSenior Project Manager | TelecommunicationVIC
- FTAndroid DeveloperNSW
- FTInfrastructure Solutions ArchitectACT
- FTTeam Leader Full Stack, Python, FinanceNSW
- FTNetApp Storage ConsultantWA
- FTOutbound TelesalesVIC
- CCiOS DeveloperNSW
- FTScrum Master | High Profile FintechNSW
- CCSenior Infrastrcture Project ManagerACT
- CCIT Security ArchitectACT
- FTEMC Storage ConsultantWA
- FTIT Pre-Sales EngineerSA
- CCDigital Solutions ManagerNSW
- CCBusiness Analyst with change management experienceACT
- CCSenior Business Analyst -Change and SAP ProcurementNSW
- FTLinux Systems AdministratorNZ
- CCE-Commerce - Senior Web DeveloperNSW
- CCJava / J2ee ProgrammersACT
- FTCarrier/ Industrial Network ConsultantsWA
- CCInformatica Developer (MDM)NSW
- CCTest Manager (HP Quality Centre / Kronos)NSW
- FTPositive Vetted ICT positions - Defence intelligence and information securityACT
- FTMDM EngineerNSW
- FTTechnical Support Engineer | Cloud | Automation techsNSW