Kim Dotcom's bold new venture, the file-storage and sharing service Mega, is drawing criticism as security researchers analyze how the site protects users' data. In short, they advise: don't trust it.
Many of the domain names used by a cybercriminal gang to control computers infected with the Virut malware were disabled last week in a coordinated takedown effort, Spamhaus, an organization dedicated to fighting spam, announced Saturday.
This workspace contains 10 security mistakes. Can you spot the errors that put confidential information at risk?
Two iPhone hackers hinted they're making progress towards developing a new jailbreak for the latest version of Apple's mobile operating system.
Google thinks it might have found an answer to the vexing problem of forgotten or weak passwords: "physical" passwords, which might come in the form of a piece of jewelry such as a ring.
Researchers from Security Explorations, a Poland-based vulnerability research firm, claim to have found two new vulnerabilities in Java 7 Update 11 that can be exploited to bypass the software's security sandbox and execute arbitrary code on computer...
Trend Micro has spotted a piece of malicious software that masquerades as the latest patch for Java, a typically opportunistic move by hackers.
A U.S. lawmaker has proposed legislation that would allow mobile phone users to ask apps to stop collecting their personal data and to delete information collected in the past.
The Shylock home banking malware has been updated with new functionality that allows it to spread automatically using the popular Skype Voice-over-IP (VoIP) and instant messaging client.
European Commission proposals for a strategy on cybercrime have come under fire before they have even been released.
Foxit released version 5.4.5 of its Foxit Reader PDF viewer plug-in on Thursday in order to address a critical remote code execution vulnerability that could have allowed attackers to compromise computers running previous versions of the software.
U.S. Attorney Carmen M. Ortiz said Wednesday that prosecutors recognized that there was no evidence against Internet activist Aaron Swartz that warranted severe punishment.
Microsoft vowed on Wednesday to improve two of its security products after both failed to pass an evaluation by a Germany security software testing organization.
Adobe released security patches for its ColdFusion application server on Tuesday, addressing four critical vulnerabilities that have been actively exploited by attackers since the beginning of January.
A Canadian think tank called on Tuesday for continued scrutiny of U.S. security vendor Blue Coat Systems after a new technical analysis showed wide use of its products in countries with human rights and censorship concerns.
Most Popular Reviews
- 1 2016 Ford Mustang EcoBoost review
- 2 Synology DS216+ Review
- 3 Review: TCL C1 series 4K TV
- 4 Tech21 Evo Xplorer iPhone case review
- 5 LG 55EG960T OLED UHD TV
Join the Good Gear Guide newsletter!
Latest News Articles
- WiFi review: Does MU-MIMO currently make a difference?
- Check out our Father’s Day Gift Guide
- Stratasys unveils mega, robotic 3D printers to build large parts
- iOS 10 gives apps room to grow
- Google is bringing its Wi-Fi Assistant feature to all Nexus phones
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCSenior Security Specialist - McAfeeVIC
- CCContract Systems Analyst (Data Management/Web) 160818/SA/602Asia
- CCProject AnalystVIC
- CCDevOps Engineer - Php, LAMP, XML, scripting, JavaNSW
- CCSenior IT Project SpecialistVIC
- CCChange Communications ManagerNSW
- CCNetwork Implementation EngineerNSW
- CCContract Systems Analyst (Infrastructure/JAVA) 160901/SA/486Asia
- CCAsset Transfer Specialist | TelecommunicationVIC
- CCBackfill Support Engineer (Renewable 12-month Contract)Asia
- FTIT Security & Risk ManagerNSW
- FTBusiness Intelligence Team LeadVIC
- CCContract Analyst Programmer (JBoss/J2EE/SQL) 160830/AP/193Asia
- CCSAP Program Manager - CBDNSW
- FTOperations ManagerNSW
- CCStorage / Server EngineerNSW
- CCSenior Project Manager - TelecommunicationVIC
- CCITIL- Technical Release CoordinatorNSW
- CCContract Analyst Programmer (JAVA/J2EE/SQL) 160824/AP/187Asia
- CCComms project specialistVIC
- CCAutomation ManagerNSW
- CCContract Systems Analyst (Windows 7/8/10) 160901/SA/212Asia
- CCOracle DBA with Solaris experienceNSW
- FTProject Administrator (Agile)WA
- CCCustomer Service SpecialistVIC