Malicious advertisements made their way last week to almost two dozen popular websites and used browser-based exploits to infect computers with CryptoWall, a nasty file-encrypting ransomware program.
Google is letting users protect their accounts against password compromises by adding support for two-factor authentication based on physical USB keys.
If you haven't updated your Flash Player with the fixes released on Oct. 14, you may be vulnerable to new attacks using a commercial exploit kit called Fiesta, security researchers warn.
Users who are careful to download files only from trusted websites may be tricked by a new type of Web vulnerability: this one cons them into downloading malicious executable files that are not actually hosted where they appear to be.
Hackers claim to have stolen a database of almost 7 million Dropbox log-in credentials, but the company says its service was not hacked and that unrelated websites are the data source.
Many security experts feel that passwords are no longer sufficient to keep online accounts safe from hackers, but we're still a long way from widespread adoption of biometrics and alternative methods of authentication.
More and more websites are looking to enable SSL encryption to protect their visitors from eavesdroppers and hackers. Now web infrastructure company CloudFlare will make it a bit easier by adding that feature to the free version of its hosting servic...
Google, Dropbox and the Open Technology Fund are supporting a new organization focused on making open-source security and privacy tools more user-friendly.
Nine months after revealing plans to develop a decentralized and encrypted chat application, BitTorrent has opened public testing for Windows, Mac and Android versions of the program Wednesday.
Twitter's recently announced bug bounty program has helped the company identify and patch a serious vulnerability that could have potentially disrupted advertising on its platform.
The default browser in Android versions older than 4.4 has a vulnerability that allows malicious websites to bypass a critical security mechanism and take control of a user's authenticated sessions on other sites.
A software development project launched Monday aims to create free tools that simplify the encryption of online forms of communication like email, instant messaging, SMS and more by solving the complexity associated with the exchange and management o...
A critical vulnerability in a popular e-commerce extension for the Joomla content management system allows malicious users to gain super-admin privileges to sites that run the software.
An archive containing nearly 5 million Gmail addresses and plain text passwords was posted Tuesday on an online forum, but the data is old and likely sourced from multiple data breaches according to one security firm.
Adobe Systems released a critical security update for Flash Player that fixes 12 security vulnerabilities, but pushed back its planned patches for Reader and Acrobat by a week.
Most Popular Reviews
- 1 Evapolar USB air conditioner review
- 2 LED Lenser P7R Professional Torch review
- 3 Aftershokz Wireless Trekz Titanium Bone Conduction Bluetooth Headphones review
- 4 Review: Periscope users rejoice with Feiyu’s G4 Plus 3-Axis Gimbal for Smartphone video
- 5 2016 Ford Mustang EcoBoost review
Join the Good Gear Guide newsletter!
Latest News Articles
- Boat rental with GetMyBoat – the AirBnB of boating
- Review: Asus ROG G752 OC Edition - Faster than many desktop gaming PCs
- Make a Wi-Fi gadget with a $9.99 Orange Pi development board
- Analysts laud and lance new Microsoft browser armor
- Should I drill a hole into my iPhone 7 to give it a headphone jack?
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCData Analyst | Data Management Framework | Experience in RNSW
- FTOutbound TelesalesVIC
- CCData Analyst | Data Feeds | Catalogue and MapNSW
- CCSecurity Cleared IT Professionals - Expression of InterestSA
- CCTechnical Architect/DesignerACT
- CCiOS DeveloperNSW
- FTInfrastructure Solutions ArchitectACT
- CCTest Manager (HP Quality Centre / Kronos)NSW
- CCSoftware TesterACT
- CCContract Systems Analyst (IT Security) 160928/JP/653Asia
- FTPositive Vetted ICT positions - Defence intelligence and information securityACT
- FTCarrier/ Industrial Network ConsultantsWA
- CCContract Junior Programmer (J2EE/SQL) 160927/JP/551Asia
- FTTest Manager (HP Quality Centre / ARIBA)NSW
- CCService Desk analystSA
- CCDesktop Infrastructure SpecialistACT
- CCSenior Change ManagerVIC
- CCFull Stack Application Developer - IoT projectsVIC
- CCJava / J2ee ProgrammersACT
- CCSenior Business Analyst -Change and SAP ProcurementNSW
- CCSenior Project ManagerACT
- CCContract Web Developer (160915/WD/vmp)Asia
- CCInformatica Developer (MDM)NSW
- FTBackup ConsultantWA
- CCBI Reporting AnalystACT