Researchers from browser security vendor Trusteer have identified a new variant of the SpyEye financial Trojan that tricks online banking users into changing the phone numbers associated with their accounts.
Facebook has partnered with security vendor Websense to protect its users from third-party malicious URLs spammed on the social networking website, the companies said on Monday.
Romania has long been considered a hotbed for cybercriminal activity, but in recent years law enforcement authorities have made significant efforts to crack down on online fraud gangs that steal millions every year from victims worldwide.
Sony PlayStation users are being warned by the FBI about scams targeting them and other online consumers.
With geeks still scrambling to get their hands on the last of Hewlett-Packard's US$99 TouchPads, a $US49 deal just seems too good to be true.
A California man was sentenced to 12 years and seven months in prison Thursday for his role as the brains behind a widespread phishing scam that took in more than 38,000 victims.
U.K. cybercrime investigators claimed victory with the sentencing of three men on Monday following the prosecution of an organized phishing gang.
A 27-year-old man has been sentenced to 13 years in prison for managing a phishing operation in conjunction with Egyptian hackers that looted consumer bank accounts.
A scam that has been making its way around Twitter for some time has resurfaced recently and promises to increase a user's followers, but really gives control of one's account to a questionable third party.
Can you believe it? As I sat down this morning to write this column, I got hit by a drive-by download of FakeAV.
You'd think it was the end of the world.
Malware creators are already using the news of Osama Bin Laden's death as a opportunity to try and dupe people into clicking on malicious links. According to cloud-security firm Zscaler, researchers were already seeing malicious sites emerge to capit...
The announcement late Sunday of the death of al-Qaeda leader Osama bin Laden has set the Internet abuzz, as users searched for information and shared their thoughts on the killing of one of the world's most wanted men.
A local security expert is dumbfounded by the ease in which a fake <i>Twilight: Breaking Dawn</i> game application has spread across Facebook, and has warned Australians to be less trusting when it came to approving applications on the social network...
Verizon on Wednesday said that it filed a lawsuit this week against a group of people and related companies that it alleges duped people into signing up and getting charged for premium short message services.
Most Popular Reviews
- 1 Motorola Moto X (2nd Gen) review: Raising the bar
- 2 Xiaomi Mi4 review: Xiaomi's best yet
- 3 Samsung Galaxy Note Edge review: Lightly flawed, Undeniably special
- 4 Sony Xperia Z3 review: The no-frills flagship
- 5 Samsung's Galaxy Alpha review: A peek into the Galaxy S6
Best Deals on GoodGearGuide
Latest News Articles
- NIST pledges transparency in NSA dealings over crypto standards
- North Carolina could be next in Google Fiber roll-out
- Conference calls a waste of time? In 1915, this one made history
- Box rides high on Wall Street’s warm welcome
- China tightens Internet control by blocking VPN services
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.