The hackers behind the Kelihos botnet are trying to capitalize on users' increased awareness about the security of Apple online accounts through a new phishing campaign.
Professional networking site LinkedIn is rolling out new features that allow users to easily manage authenticated sessions across multiple devices and better understand what caused security-related changes on their accounts.
Following in the footsteps of other major Internet companies, Twitter has started paying monetary rewards to security researchers who find and report vulnerabilities in its Web services and mobile apps.
Some visitors to several high-profile websites last week were redirected to browser exploits that installed malware on their computers because of malicious advertisements on those sites.
Cybercriminals are in the process of rebuilding the Gameover Zeus (GOZ) botnet, which law enforcement authorities took over in June, and recent research suggests that they've had some success, especially in the U.S.
Adobe Systems has released security patches for its Flash Player, Reader and Acrobat products, addressing a total of eight vulnerabilities, including one that is being exploited by attackers.
Routers appear to be as insecure as ever, after hackers successfully compromised five popular wireless models during a contest at the DefCon 22 security conference, reporting 15 new vulnerabilities to affected vendors.
Specialized servers used by many ISPs to manage routers and other gateway devices provisioned to their customers are accessible from the Internet and can easily be taken over by attackers, researchers warn.
A security audit of 10 popular Internet-connected devices - components of the so-called Internet of Things - identified an alarmingly high number of vulnerabilities.
The Russian Ministry of Interior is willing to pay 3.9 million roubles, or around US$111,000, for a method to identify users on the Tor network.
A critical vulnerability found recently in a popular newsletter plug-in for WordPress is actively being targeted by hackers and was used to compromise an estimated 50,000 sites so far.
Six people have been indicted on charges of running an international ring that resold tickets bought through compromised StubHub accounts for some of New York's biggest concerts and sporting events.
Developers of Tor software believe they've identified a weakness that was scheduled to be revealed at the Black Hat security conference next month that could be used to de-anonymize Tor users.
Advocacy group the Electronic Frontier Foundation wants to address the poor security track record of home routers with a new firmware project that will encourage users to share their Internet connection publicly by setting up guest Wi-Fi networks.
Researchers are gearing up to hack an array of different home routers during a contest next month at the Defcon 22 security conference.
Most Popular Reviews
- 1 Fetch TV Mighty review: Better than Foxtel
- 2 Fetch TV Mini review: Make your TV a smart TV
- 3 Parrot Mambo Drone review
- 4 Evapolar USB air conditioner review
- 5 Hisense Series 7 ULED 4K UHD TV review
Join the Good Gear Guide newsletter!
Latest News Articles
- AMD drops Radeon RX 460, RX 470 prices ahead of Nvidia's GeForce GTX 1050 launch
- AT&T will acquire Time Warner for US$85.4b in content play
- Gallipoli is now an amazing video game
- iPads and Apple TV aimed at transforming patient care
- This week in games: Diablo 4 whispers, Civilization VI launch
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- Google Pixel XL full, in-depth smartphone review: The new best Android phone
- TV buying guide: What to look for when buying a TV in 2016
- Best iPhone 7 and iPhone 7 Plus plans: Optus vs Telstra vs Vodafone vs Virgin
- Which flagship TV is best? Sony 4K HDR Bravia 2016 versus LG 4K HDR OLED 2016
- 10 Blu-ray movies / Best looking Blu-ray movies
- FTJava Script, Frontend Developer- DynamoDB or MongoDBNSW
- FTSolution ArchitectACT
- FTEmbedded Software EngineerSA
- CCOracle Functional Consultant | 6mth ContractVIC
- FTMobile Delivery Manager / Studio LeadNSW
- CCSenior Siebel Business AnalystACT
- CCContract IT Assistant (PC LAN Support) 161020/ITA/652Asia
- CCImplementation ManagerVIC
- CCL1 Desktop Support - 3 days a weekNSW
- CCQA Test Lead- Digital, Mobile, UX, AGILE, CloudNSW
- FTOperational Integrity ManagerNSW
- CCField EngineerVIC
- CCInfrastructure Project Manager - Site MoveNSW
- CCDemand ManagerNSW
- FTSoftware Development ManagerNSW
- CCSiebel Technical Integration SpecialistACT
- CCDevOps EngineerNSW
- CCSenior Developer - C++/Perl/PythonNSW
- CCCommunications ManagerVIC
- CCContract Management SpecialistNSW
- FTSenior MS Dynamics CRM ConsultantSA
- FTSolutions ArchitectNSW
- FTLevel 2 Service Desk AnalystVIC
- FTSenior Architect | Perl | Linux |MySQL | Infrastructure | TelecomNSW
- CCDevOps/Automation EngineerNSW