A hack for iOS 6.1 has been published online showing how user caneasily bypass an iPhone 5's pin code.
Facebook can stick with its real name policy in Germany, and doesn't have to allow nicknames on its platform for now. The regulator that ordered Facebook to change it policy based its orders on inapplicable German law, a German court ruled.
As jumbled news reports of what appeared to be a meteor shower over Russia trickled out of the country, some of the best views of what happened were from the dashboards of Russian cars.
There's a way to gain access to a lot of private data on an iPhone 5 running iOS 6.1, even when that phone is locked with a passcode. Reports about the exploit began circulating early Thursday, though the YouTube video with the method was actually po...
Several Certificate Authorities (CAs) have formed an advocacy group called the Certificate Authority Security Council (CASC), which will focus on promoting new security standards, policies and best practices for SSL (Secure Sockets Layer) deployment ...
Privacy and digital rights groups are overstating the privacy concerns in a controversial cyberthreat information bill introduced this week in the U.S. Congress, the bill's sponsors and leaders of some business groups said.
A recently found exploit that bypasses the sandbox anti-exploitation protection in Adobe Reader 10 and 11 is highly sophisticated and is probably part of an important cyberespionage operation, the head of the malware analysis team at antivirus vendor...
Europe's top cyber security agency warned on Thursday that the growth in cloud computing is a “double-edged sword”.
Two security vendors have detected an uptick in targeted malicious software attacks against the Uyghur community, an ethnic group in western China that has long campaigned for greater independence from Beijing.
Spanish police say they've broken up a crime ring that extorted money from Internet users by accusing them of viewing child pornography or terrorist-related materials and demanding fines.
Two U.S. lawmakers have reintroduced a controversial cyberthreat information-sharing bill over the objections of some privacy advocates and digital rights groups.
Devices used by many radio and TV stations to broadcast emergency messages as part of the U.S. Emergency Alert System (EAS) contain critical vulnerabilities that expose them to remote hacker attacks, according to researchers from security consultancy...
Researchers from security firm FireEye claim that attackers are actively using a remote code execution exploit that works against the latest versions of Adobe Reader 9, 10 and 11.
U.S. President Barack Obama has signed an executive order requiring federal agencies to share cyberthreat information with private companies and to create a cybersecurity framework focused on reducing risks to companies providing critical infrastruct...
Anonymous failed to disrupt the White House's online video stream of President Barack Obama's State of the Union address on Tuesday night.
Most Popular Reviews
- 1 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 2 Mazda MX-5 (2016) review: Absolute driving purity
- 3 Sony 75-inch UHD TV (X9400C) review: Sony and Android are a winning duo
- 4 LG 55EG960T OLED UHD TV
- 5 Panasonic Viera UHD TV review: good hardware, fragmented software
Join the Good Gear Guide newsletter!
Best Deals on Good Gear Guide
Latest News Articles
- Microsoft lets cautious users try more of Windows 10’s leading edge
- A new IoT gateway design could be Bluetooth's ticket to the cloud
- Data science achieves the ultimate ROI: A craft beer
- SAP slaps patch on leaky factory software
- Paul McCartney gives Skype some silly love songs
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTDigital Marketing Specialist | Media BuyerNSW
- FTJunior Project Manager | Permanent role in Canberra | NV1/2 clearedACT
- CCService Desk ManagerVIC
- CCService ModellerNSW
- FTBusiness Analyst (SCADA / CSI)VIC
- FTSecurity ArchitectWA
- FTAxway API DeveloperNSW
- CCSenior Project Manager - Cloud / Telecommunications (Melb CBD)VIC
- FTCyber Security SpecialistNSW
- CCContract Software Engineer (Crystal Report/JAVA) 160129/SE/vccAsia
- CCHybris Developer - Global ConsultancyNSW
- CCSenior Information Security SpecialistNSW
- CCJunior .NET DeveloperQLD
- FTVB6 DeveloperNSW
- CCSystem TesterQLD
- FTOracle System Integration Engineer - CANBERRASA
- FTSystems Administrator/Engineer | Projects & BAU | Coastal Newcastle NSWWA
- CCDesktop Support L1, 2 & 3NSW
- CCEnterprise Architect - Network & InfrastructureNSW
- CCContract System Analyst (MSSQL/.Net/Mobile App) 160122/SA/vhaAsia
- CCSenior Business Analyst - BaselineACT
- CCAutomation QAVIC
- CCFront End Developer - MelbourneVIC
- FTServer EngineerNSW
- CCTechnical Integration Specialist - MicrosoftACT