Malicious advertisements on domains belonging to Disney, Facebook, The Guardian newspaper and others are leading people to malware that encrypts a computer's files until a ransom is paid, Cisco Systems has found.
The ransomware model is increasingly being adopted by cybercriminals who target mobile users, one of their latest creations being able to encrypt files stored on the SD memory cards of Android devices.
Law enforcement agencies in 111 countries collaborated to disrupt thousands of online pharmacies in what Interpol claims was the largest ever global operation targeting organized criminal networks that sell fake medicines.
Last month Google offered refunds to users who bought a fake antivirus app from Google Play, but the scam seems to be catching on and security researchers have recently identified similar apps in both the Android and Windows Phone app stores.
The current state of online advertising endangers the security and privacy of users and the U.S. Federal Trade Commission should force the industry to offer better protections through comprehensive regulation, the U.S. Senate said in a report.
They spread lies. They push products you don't care about. They make unpopular people look popular. Sometimes, they take over your machine with malware.
Cybercriminals stole debit card information from customers of dozens of financial institutions in a phishing campaign that combined rogue text messages and with VoIP calls.
An Electronic Arts website was hacked in a phishing scheme aimed at the acquisition of Apple IDs and credit card numbers, security researchers reported Wednesday.
Attacks recently observed in Poland involved cybercriminals hacking into home routers and changing their DNS settings so they can intercept user connections to online banking sites.
Changes in Google Chrome extension ownership can expose thousands of users to aggressive advertising and possibly other threats, two extension developers have recently discovered.
Scammers have devised new ways to trick users into revealing personal information, hand over control of computers and pay for unnecessary software and tech support services, security experts warn.
A U.S. judge has shut down an online business listing operation that allegedly bilked more than US$14 million from U.S. small businesses and churches.
Security experts used fake Facebook and LinkedIn profiles pretending to represent a smart, attractive young woman to penetrate the defenses of a U.S. government agency with a high level of cybersecurity awareness, as part of an exercise that shows ho...
The U.S. Federal Trade Commission has begun to send more than 58,000 refund checks to consumers who lost money to Green Millionaire, a company that promised a free book explaining how to power cars and homes at no cost, but then billed customers for ...
The cybercriminals behind ZeroAccess, one of the largest botnets in existence, have lost access to more than a quarter of the infected machines they controlled because of an operation executed by security researchers from Symantec.
Most Popular Reviews
- 1 Evapolar USB air conditioner review
- 2 Hisense Series 7 ULED 4K UHD TV review
- 3 LED Lenser P7R Professional Torch review
- 4 Aftershokz Wireless Trekz Titanium Bone Conduction Bluetooth Headphones review
- 5 Review: Periscope users rejoice with Feiyu’s G4 Plus 3-Axis Gimbal for Smartphone video
Join the Good Gear Guide newsletter!
Latest News Articles
- Linksys EA9500 Max-Stream AC5400 MU-MIMO Gigabit router review
- Paris motor show turns on to electric cars
- Israeli startup says its new software would have prevented Tesla hack
- Microsoft moves Cortana and Bing into Microsoft Research to accelerate new features
- Google Maps for Android adds 'OK Google' voice, navigation commands and other search tricks
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTSenior Project Manager | TelecommunicationVIC
- CCSenior Infrastrcture Project ManagerACT
- CCSenior .NET DeveloperVIC
- CCNetwork Design Specialist - TelecommunicationsNSW
- CCE-Commerce - Senior Web DeveloperNSW
- FTNetApp Storage ConsultantWA
- CCTest Manager (HP Quality Centre / Kronos)NSW
- CCData Analyst | Data Feeds | Catalogue and MapNSW
- CCSolutions ArchitectACT
- CCFull Stack Application Developer - IoT projectsVIC
- CCContract Systems Analyst (IT Security) 160928/JP/653Asia
- FTSenior PHP DeveloperNSW
- CCTechnical Architect/DesignerACT
- FTTest Manager (HP Quality Centre / ARIBA)NSW
- CCiOS DeveloperNSW
- FTOutbound TelesalesVIC
- FTJava DeveloperNSW
- FTNetwork and Security Design EngineerNSW
- CCInfrastructure Project Manager - DCR ProjectNSW
- CCICT Security AuditorACT
- CCBI Reporting AnalystACT
- CCeCommerce Project ManagerNSW
- CCInformatica Developer (MDM)NSW
- FTCustomer Solutions Engineer | Voice | Data | TelcoNSW
- FTBackup ConsultantWA