Even though the majority of data breaches continue to be the result of financially motivated cybercriminal attacks, cyberespionage activities are also responsible for a significant number of data theft incidents, according to a report that will be re...
Google must pay a €145,000 (US$190,000) fine in Germany for gathering and storing emails, photos, passwords and chat protocols from unprotected Wi-Fi networks with Google Street View cars, Hamburg's Commissioner for Data Protection and Freedom of Inf...
The largest bitcoin exchange, Mt. Gox, is in a continuing battle with miscreants trying to manipulate the price of the virtual currency.
Researchers from security firm Trusteer have found a new variant of the Gozi banking Trojan program that infects a computer's Master Boot Record (MBR) in order to achieve persistence.
Cody Andrew Kretsinger, a 25-year-old man from Decatur, Illinois, was sentenced Thursday to one year in federal prison for his role in a May 2011 breach of a Sony Pictures website and database.
Wikileaks' latest release is billed as a transcript of a "secret meeting," but it may more accurately be termed a promotion.
A Russian porn site is delivering malware that uses the victims' computers to mine bitcoins, according to research from ThreatTrack Security.
The U.S. House of Representatives has voted to approve a controversial cyberthreat information-sharing bill, despite opposition from the White House and several privacy and digital rights groups.
Security researchers from Russian cybercrime investigations company Groub-IB have recently identified a new piece of malware designed to steal login credentials from specialized software used to trade stocks and other securities online.
Thirteen popular home and small office routers contain security problems that could allow a hacker to snoop or modify network traffic, according to new research.
The volume of mobile spam messages touting free gift cards sharply fell after the U.S. Federal Trade Commission (FTC) filed complaints in early March against eight companies, according to antispam vendor Cloudmark.
The U.S. House of Representatives moved closer Wednesday toward the passage of the Cyber Intelligence Sharing and Protection Act (CISPA), despite concerns that the cyberthreat information-sharing bill will allow Web-based companies to share a wide am...
Following similar initiatives by Apple, Google and Facebook, Microsoft is enabling two-factor authentication for its Microsoft Account service, the log-on service for many of its online and desktop products.
The volume, duration and frequency of distributed denial-of-service (DDOS) attacks used to flood websites and other systems with junk traffic have significantly increased during the first three months of this year, according to a report released Wedn...
The chief sponsor of the Cyber Intelligence Sharing and Protection Act (CISPA) in the U.S. Congress has ignited a Twitter storm by suggesting many opponents of the proposed cyberthreat sharing bill are 14-year-olds in basements.
Most Popular Reviews
- 1 Review: TCL C1 series 4K TV
- 2 Sony 75-inch UHD TV (X9400C) review: Sony and Android are a winning duo
- 3 LG 55EG960T OLED UHD TV
- 4 Panasonic Viera UHD TV review: good hardware, fragmented software
- 5 Microsoft Lumia 640 review: Honouring Nokia's legacy
Join the Good Gear Guide newsletter!
Best Deals on Good Gear Guide
Latest News Articles
- Report: Microsoft could debut Xbox One game streaming stick and 'Xbox TV' at E3
- This sticker can wirelessly charge your smartphone or tablet
- Microsoft breaks own design rules in dupe-the-user Windows 10 upgrade tactic
- Samsung isn't giving up on Android Wear, it's just not making any new Android Wear watches
- Google quietly kills its Nexus Player as Chromecast overshadows Android TV
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTNetwork EngineerNSW
- CCContract Analyst Programmer (IT Application/.Net) 160523/AP/254Asia
- CCSenior Service Desk ManagerNSW
- FTTester/Business AnalystWA
- CCSolutions Architect - Enterprise ApplicationsNSW
- FTAX Lead Functional ConsultantNSW
- CCFull Stack Developer - AngularNSW
- CCCCB & MDM ConsultantNSW
- CCDeemed Order Business SpecialistVIC
- FTPermanent Defence network engineer - career progression & flexible conditionsACT
- FTLinux Infrastructure EngineerVIC
- CCSenior Business AnalystVIC
- CCSecurity Administrative Support OfficerACT
- FTDynamics Project ManagerNSW
- FTSenior Network Engineer - Technical LeadACT
- FTLinux System EngineersNSW
- CCSystem Engineer - Server Migration experienceNSW
- CCLinux AdministratorVIC
- CCSr. Windows Server Administrator- Financial Institution BckgNSW
- CCAccess Control Administration / Help desk OperatorACT
- CCContract Programmer (MS SQL Server/SQL/Web) 160518/P/626Asia
- CCNV1 Consultant | Groundbreaking Defence decision support applicationACT
- CCSoftware DevelopersACT
- FTSoftware DeveloperSA
- CCSenior Business Analyst, Marketing SystemsNSW