Twitter users in the Netherlands are being targeted by a piece of malware that hijacks their accounts, according to security vendor Trusteer.
Even though the majority of data breaches continue to be the result of financially motivated cybercriminal attacks, cyberespionage activities are also responsible for a significant number of data theft incidents, according to a report that will be re...
Google must pay a €145,000 (US$190,000) fine in Germany for gathering and storing emails, photos, passwords and chat protocols from unprotected Wi-Fi networks with Google Street View cars, Hamburg's Commissioner for Data Protection and Freedom of Inf...
The largest bitcoin exchange, Mt. Gox, is in a continuing battle with miscreants trying to manipulate the price of the virtual currency.
Researchers from security firm Trusteer have found a new variant of the Gozi banking Trojan program that infects a computer's Master Boot Record (MBR) in order to achieve persistence.
Cody Andrew Kretsinger, a 25-year-old man from Decatur, Illinois, was sentenced Thursday to one year in federal prison for his role in a May 2011 breach of a Sony Pictures website and database.
Wikileaks' latest release is billed as a transcript of a "secret meeting," but it may more accurately be termed a promotion.
A Russian porn site is delivering malware that uses the victims' computers to mine bitcoins, according to research from ThreatTrack Security.
The U.S. House of Representatives has voted to approve a controversial cyberthreat information-sharing bill, despite opposition from the White House and several privacy and digital rights groups.
Security researchers from Russian cybercrime investigations company Groub-IB have recently identified a new piece of malware designed to steal login credentials from specialized software used to trade stocks and other securities online.
Thirteen popular home and small office routers contain security problems that could allow a hacker to snoop or modify network traffic, according to new research.
The volume of mobile spam messages touting free gift cards sharply fell after the U.S. Federal Trade Commission (FTC) filed complaints in early March against eight companies, according to antispam vendor Cloudmark.
The U.S. House of Representatives moved closer Wednesday toward the passage of the Cyber Intelligence Sharing and Protection Act (CISPA), despite concerns that the cyberthreat information-sharing bill will allow Web-based companies to share a wide am...
Following similar initiatives by Apple, Google and Facebook, Microsoft is enabling two-factor authentication for its Microsoft Account service, the log-on service for many of its online and desktop products.
The volume, duration and frequency of distributed denial-of-service (DDOS) attacks used to flood websites and other systems with junk traffic have significantly increased during the first three months of this year, according to a report released Wedn...
Most Popular Reviews
- 1 2016 Ford Mustang EcoBoost review
- 2 Review: TCL C1 series 4K TV
- 3 Tech21 Evo Xplorer iPhone case review
- 4 LG 55EG960T OLED UHD TV
- 5 Microsoft Lumia 640 review: Honouring Nokia's legacy
Join the Good Gear Guide newsletter!
Latest News Articles
- Linksys AC600 MU-MIMO WiFi review
- Hardcore Hardware: The CyberPower Pro Streaming I300 is made for Twitch stardom
- Only Apple Music subscribers will get to watch Apple's live music fest this year
- Here's how the Xbox One S stacks up to the original
- WiFi review: Does MU-MIMO currently make a difference?
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCDB2 Database AdministratorACT
- FTOperations ManagerNSW
- CCContract Junior Programmer (JAVA/J2EE/SQL) 160902/JP/709Asia
- CCDesktop Support EngineerNSW
- FTUnix Systems AdministratorNSW
- CCSenior Project Manager, Cyber Security TransformationNSW
- CCInfrastructure Project Manager (12-month renewable contract)Asia
- CCBackfill Support Engineer (Renewable 12-month Contract)Asia
- FTPrincipal Business Consultant- Wealth ManagementNSW
- CCSenior IT Project SpecialistVIC
- CCContract Systems Analyst (Loutus Notes) 160815/SA/102Asia
- FTBusiness Intelligence Team LeadVIC
- CCTechnology Specialist Networks & SecurityVIC
- CCFront End DeveloperNSW
- CCSenior Change Analyst, WealthNSW
- FTIT Manager - Infrastructure Strategy and OperationsNSW
- FTDefence Network EngineerACT
- CCWeb Content SpecialistNSW
- CCContract Analyst Programmer (IT Application/Web) 160825/AP/183Asia
- FTBid Manager - Intelligent TechnologyVIC
- CCAgile Business AnalystNSW
- CCContract Analyst Programmer (JAVA/J2EE/MySQL) 160823/AP/172Asia
- CCMainframe Application ArchitectNSW
- CCProgram SchedulerVIC
- FTPython Data EngineerWA