The attackers who recently infected the website of the Council on Foreign Relations (CFR) with an exploit for an unpatched vulnerability in Internet Explorer, also targeted the website of Capstone Turbine Corporation, a U.S.-based manufacturer of gas...
Starting with version 25 of Google Chrome, browser extensions installed offline by other applications will not be enabled until users give their permission through a dialog box in the browser interface.
Cloud-based security services provider Zscaler has released an implementation for Internet Explorer of the HTTPS Everywhere browser security extension.
A recent Java 7 update allows users to completely prevent Java applications from running inside browsers or to restrict how Web-based Java content is handled by the Java Runtime Environment (JRE) client. These features will benefit security-conscious...
Google has changed the way it handles image searches so that pornographic pictures are less likely to be presented to those who aren't looking for them.
Bromium has upgraded its security platform vSentry, which uses virtualization to isolate malicious code, to protect virtual desktops and old Windows XP PCs.
A new variant of a Trojan program called Reveton that prevents victims from using their computers and displays rogue messages from law enforcement agencies is using localized voice messages to trick victims into paying made-up fines, according to res...
Security researchers have identified a botnet controlled by its creators over the Tor anonymity network. It's likely that other botnet operators will adopt this approach, according to the team from vulnerability assessment and penetration testing fir...
Twitter has restricted the ability of attackers to post tweets and perform other actions on behalf of many users who have phone numbers associated with their accounts, but some users need to enable a PIN option in order to be protected.
Mobile network operator Orange will install Lookout's Mobile Security application on some of the Android-based tablets and smartphones it distributes starting in 2013, aiming to protect millions of subscribers in the first year alone.
Attackers can read emails, contacts and other private data from the accounts of Yahoo users who visit a malicious page by abusing a feature present on Yahoo's Developer Network website, according to an independent security researcher.
The Romanian domain names of Google, Yahoo, Microsoft, Kaspersky Lab and other companies were hijacked on Wednesday and were redirected to a hacked server in the Netherlands.
An unknown attacker inserted malicious code into the latest version of the Piwik open-source Web analytics software after compromising the project's website on Monday.
Cybercriminals are increasingly using .eu domain names in their attack campaigns, according to data from multiple security companies.
A Web security policy mechanism that promises to make HTTPS-enabled websites more resilient to various types of attacks has been approved and released as an Internet standard -- but despite support from some high-profile websites, adoption elsewhere ...
Latest News Articles
- Jawbone Mini Jambox Bluetooth speaker
- Lego Marvel Super Heroes (Xbox One)
- Deaths at Apple supplier in China concern labor group
- Foxtel Play screens on LG Smart TVs
- Home appliance makers connect with open source 'Internet of things' project
Most Popular Articles
- 1 How to update your Samsung Galaxy S4 to Android 4.3 Google Edition
- 2 Aldi's new budget 8in Android tablet has 3G, makes phone calls
- 3 Tethering tutorial: How to use your iPhone as a modem
- 4 Capacitive vs resistive touchscreens
- 5 Aldi's new budget Android smartphone isn't very good value
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
Best Deals on GoodGearGuide
Best Deals on PCWorld
- Printers & ScannersView all »
- NotebooksView all »
- TabletsView all »
- Mobile PhonesView all »
- Networking, Wireless & VoIPView all »