A Louisiana man has been accused of creating counterfeit coupons and selling them on the Silk Road underground websites, potentially defrauding businesses of more than US$1 million, the Justice Department said Thursday.
The U.S. Commerce Department has proposed tighter export rules for computer security tools, a potentially controversial revision to an international agreement aimed at controlling weapons technology.
A team of researchers has developed a system that makes it much harder for hackers to obtain usable passwords from a leaked database, which could help blunt the damage from a data breach.
Password managers are a great way to supply random, unique passwords to a high number of websites. But most still have an Achilles' heel: Usually, a single master password unlocks the entire vault.
Hunter Moore, the infamous creator of a website that published nude photos of people that had been pilfered from their email accounts, pleaded guilty on Wednesday to two counts in federal court.
A Swedish man pleaded guilty Wednesday to peddling one of the most prevalent spying programs called Blackshades that was widely used by the criminal underground.
A researcher has released 10 million usernames and passwords collected from data breaches over the last decade, a step he worries could be a legally murky but one that will help security research.
A 26-year-old man has been charged with three counts of conspiracy for his alleged role in running Silk Road 2.0, which launched shortly after the demise of the first iteration of the infamous underground market.
The developer of a widely vilified website that aggregated feeds from unsecured webcams is apparently looking for work as a remote programmer.
China claimed on Sunday the U.S. has derailed cybersecurity cooperation between the two countries and that it doesn't tolerate hacking.
One of the most serious software flaws to affect the Internet, nicknamed "Heartbleed," was likely unknown before it was publicly disclosed, according to new research.
The latest claim of knowledge of the true identity of bitcoin's creator is being viewed with suspicion.
Five Nigerian criminal gangs are behind most scams targeting sellers on Craigslist, and they've taken new measures to make their swindles appear legitimate, according to a new study.
A type of body scanner in wide use across U.S. airports through last year fails to spot well-concealed weapons including guns and knives, computer security researchers contend.
A new California law removes a ban on using currencies other than the U.S. dollar, which is intended to accommodate the growing use of alternative payment methods such as bitcoin.
Most Popular Reviews
- 1 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 2 Mazda MX-5 (2016) review: Absolute driving purity
- 3 Sony 75-inch UHD TV (X9400C) review: Sony and Android are a winning duo
- 4 LG 55EG960T OLED UHD TV
- 5 Panasonic Viera UHD TV review: good hardware, fragmented software
Join the Good Gear Guide newsletter!
Best Deals on Good Gear Guide
Latest News Articles
- Upgrading to SAP Hana? This new tool can help prepare your code
- The eyes have it: How one startup aims to change the future of VR
- Gaming on Linux, Steam machines set to soar with DirectX competitor Vulkan
- Google didn't abuse its position in Streetmap case, UK court rules
- New Chromebook won't break with 365-pound person standing on it
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTDigital Marketing Specialist | Media BuyerNSW
- FTSenior Business Analyst - PEXASA
- FTDatabase AdministratorVIC
- CCContract System Analyst (Linux/Security/LAN) 160211/SSA/521Asia
- FTOracle Middleware ConsultantNSW
- CCRisk AnalystVIC
- CCTechnical Lead - .NET TechnologiesACT
- FTSystems Administrator/Engineer | Projects & BAU | Coastal Newcastle NSWWA
- CCPortfolio-Program SchedulerNSW
- CCContract System Analyst (JAVA/J2EE/SQL) 160205/SA/881Asia
- CCImmediate iOS Developer RequiredNSW
- FTBusiness Analyst / Scrum MasterNSW
- CCOracle Applications Projects Functional ConsultantSA
- FTSenior Unified Communications Consultant - National IT ServicesNSW
- CCSenior Test AnalystSA
- FTNetwork Engineer | NV2 clearance | Military jets, subs, bases and networksACT
- FTLinux AdministratorVIC
- CCContract Software Engineer (Crystal Report/JAVA) 160129/SE/vccAsia
- CCSolution Design EngineerACT
- CCBusiness Analyst - CanberraNSW
- CCMaster SchedulerVIC
- CCSharePoint AdministratorACT
- FTWintel EngineerNSW
- CCSolution Architect - .NET environmentACT
- CCBusiness Objects DeveloperNSW