Google has disrupted what it believes to be a targeted phishing campaign aimed at stealing e-mail from government officials, contractors and military personnel.
An 18-month-old cybersecurity research consortium organized by Northrop Grumman is making progress and should have technologies ready to deploy in about a year, officials said Wednesday.
The U.K. Government is developing a "toolbox" of Internet cyber-weapons that could be used to attack other countries, Armed Forces Minister Nick Harvey said in an admission that the military now treats the Internet as a battlefield like any other.
The U.S. military is prepared to use physical attacks in response to cyberattacks, the U.S. Department of Defense said Tuesday.
Sony plans to restore all its PlayStation Network services by this weekend in all regions except Japan, South Korea, and Hong Kong, the company said Tuesday.
Google unveiled details of Google Wallet this week. Google Wallet is an ambitious mobile payment plan designed to let your Android smartphone be your wallet, but you should consider very carefully just how secure your credit card data will be in Goog...
There is a new world order. MacDefender, and subsequently MacGuard, demonstrate that the inherent security by obscurity of the Mac is fading, and that attackers are looking at the bigger picture.
One in every 20 Windows PCs whose users turned to Microsoft for cleanup help were infected with malware, Microsoft said this week.
Can you believe it? As I sat down this morning to write this column, I got hit by a drive-by download of FakeAV.
Apple users are getting new details about one malware scare, but should be careful not to fall victim to another that may be lurking.
A security researcher has discovered a means of hijacking sensitive information from cookies in Internet Explorer. The 'cookiejacking' technique could expose credentials from Facebook, Twitter, Gmaiil, or other online services, but Microsoft doesn't ...
Lockheed Martin Saturday night acknowledged that it its information systems network had been the target of a "significant and tenacious attack," but said that its security team detected the intrusion "almost immediately and took aggressive actions to...
Computer users seem to be getting better at spotting fake websites that are trying to steal their passwords, but when it comes to mobile phones, the deck is most definitely stacked against them.
Sony's PlayStation Network online gaming service will reopen for millions of gamers across Asia on Saturday, more than five weeks after it was taken offline following a cyber attack.
Lockheed Martin’s has “major internal computer network problems,” that one security blogger is linking to compromised RSA tokens, according to published reports.
Most Popular Reviews
- 1 Microsoft Surface Pro 3 Windows 8.1 tablet
- 2 Samsung Galaxy Tab S (10.5) 4G review
- 3 LG G3 review
- 4 Nokia Lumia 930 review
- 5 Asus G550JK gaming notebook
Best Deals on GoodGearGuide
Latest News Articles
- Uber vows to defy German ban on its UberPop ride-sharing service
- Namecheap says accounts compromised in hacking incident
- Oppo launches in Australia with flagship Find 7 smartphone and more
- Billion BiPAC 8800AXL ADSL2+ modem-router
- Why hackers may be stealing your credit card numbers for years
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.