A group of U.S. lawmakers has introduced legislation that would require law enforcement agencies to get court-ordered search warrants before obtaining a suspect's mobile phone location or GPS data, instead of using prosecution-issued subpoenas.
Security researchers have uncovered yet another ongoing cyberespionage operation targeting political and human rights activists, government agencies, research organizations and industrial manufacturers primarily from Eastern European countries and fo...
Defense Distributed, the pro-gun nonprofit working to make 3D-printable gun designs freely available to everyone on the Internet, recently inched one step closer toward achieving that goal. The Austin, Texas-based group last week was granted a federa...
Former Tribune Company employee Matthew Keys has denied giving a username and password to anyone, or conspiring to cause damage to a protected computer.
Chinese cyberattacks targeting Taiwan are moving beyond stealing sensitive information, and could be capable of crippling the island's transportation and financial systems, a top security official claimed on Wednesday.
The website of a U.S. group focused on human rights in North Korea was hacked at the same time as a cyberattack on South Korean targets on Wednesday.
Security vendors analyzing the code used in the cyberattacks against South Korea are finding nasty components designed to wreck infected computers.
Cyberattacks supposedly originating from China have raised alarms in recent weeks, but U.S. businesses and government agencies should worry as much about Iran and North Korea, a group of cybersecurity experts said.
Both BlackBerry and the U.K. government have denied reports that the new BB10 software has been rejected for use in sensitive government communications.
The password encryption algorithm used in some recent versions of the Cisco IOS operating system is weaker than the algorithm it was designed to replace, Cisco revealed earlier this week.
Computer networks of banks and some broadcasters in South Korea were hit Wednesday in what is suspected to be a cyberattack, according to news reports.
Several high-profile Xbox Live accounts for former and current Microsoft employees were compromised by attackers using social engineering techniques, the company said late Tuesday.
Google has fully implemented a security feature that ensures a person looking up a website isn't inadvertently directed to a fake one.
An advertising analytics company said it has discovered a botnet that generates upwards of US$6 million per month by generating bogus clicks on display advertisements.
If U.S. law enforcement agencies agree to changes in electronic surveillance law to better protect the privacy of stored email and documents, they want several changes in return, including a requirement that email and cloud service providers hold ont...
Most Popular Reviews
- 1 Evapolar USB air conditioner review
- 2 LED Lenser P7R Professional Torch review
- 3 Aftershokz Wireless Trekz Titanium Bone Conduction Bluetooth Headphones review
- 4 Review: Periscope users rejoice with Feiyu’s G4 Plus 3-Axis Gimbal for Smartphone video
- 5 2016 Ford Mustang EcoBoost review
Join the Good Gear Guide newsletter!
Latest News Articles
- Apple Maps tunnel navigation can be dangerous
- Akitio Thunder3 PCIe SSD review: Blazingly fast external storage for rich kids
- Xbox One S controller review: New features and custom colors make for a great successor
- Why you want Google's Allo
- This week in games: Blizzard ditches Battle.net, Gears of War 4 adds PC split-screen
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTAndroid DeveloperNSW
- FTPositive Vetted ICT positions - Defence intelligence and information securityACT
- FTInfrastructure Solutions ArchitectACT
- CCTechnical Architect/DesignerACT
- FTBusiness Development Manager | ICT intelligent systems integrationVIC
- CCWAN Architect and ConsultantWA
- FTEMC Storage ConsultantWA
- CCSenior .NET DeveloperVIC
- CCContract Systems Analyst (IT Security) 160928/JP/653Asia
- CCLAN ConsultantWA
- CCICT Security AuditorACT
- CCTest Manager (HP Quality Centre / Kronos)NSW
- FTNetwork and Security Design EngineerNSW
- FTTest Manager (HP Quality Centre / ARIBA)NSW
- CCInformatica Developer (MDM)NSW
- FTOutbound TelesalesVIC
- CCSecurity Cleared IT Professionals - Expression of InterestSA
- CCBusiness Analyst with change management experienceACT
- FTJava DeveloperNSW
- FTTeam Leader Full Stack, Python, FinanceNSW
- FTOutbound TelesalesVIC
- CCFull Stack Application Developer - IoT projectsVIC
- FTOutbound TelesalesVIC
- CCSoftware TesterACT
- FTDesktop/Application SupportVIC