The hactivist group Anonymous used a series of simple technical and social exploits to crack the network of technology firm HBGary Federal, giving the company a schooling that other network security pros can learn from.
Microsoft yesterday downplayed the threat posed to Windows users by a recently-revealed vulnerability, saying that it was unlikely the bug could be exploited to compromise a computer.
The Norton Mobile Utilities beta for Android is a useful but somewhat buggy suite of free tools that any self-respecting Android geek will want to download and test. To a certain extent, it's a proof of concept, because Symantec has not yet decided w...
SAN FRANCISCO -- Virtualization technologies can help enable better security and control in cloud computing environments, RSA chief Art Coviello said today.
Deciding to move enterprise data into cloud-computing environments is still a decision fraught with anxiety over security, as well as operational and legal issues, say IT managers, but the prospect of cost savings and ability to "burst" data into the...
Web-based e-mail, social-networking and peer-to-peer services are frustrating law enforcement wiretapping efforts, a lawyer for the U.S. Federal Bureau of Investigation told lawmakers Thursday, but she did not offer concrete ideas on how to fix the p...
The Chinese government is denying any involvement in a reported cyberattack on the Canadian government, which was ultimately traced to a Chinese server.
SAN FRANCISCO -- Acknowledging that security technologies to prevent cyberattacks are insufficient, several vendors at the RSA Conference here urged companies that are making security plans to assume that at some point, they will be breached.
At a keynote speech delivered at the RSA Security Conference, Scott Charney -- Microsoft corporate vice president for Trustworthy Computing -- reiterated a vision for the future of Internet security. Charney painted a picture of a collaborative appro...
Smartphone malware is still uncommon -- at least here in the United States -- but every now and then comes a fresh reminder that the threat is real. According to Lookout Mobile Security, a new Trojan is making the rounds in various alternative app ma...
Momentum is building behind the US Federal Trade Commission call for some sort of "do not track" system. Each of the major Web browser vendors have come up with their own unique approach to preventing Web surfing habits from being tracked, and now Co...
Today's web application firewalls are not up to the challenge of securing cloud systems according to security company Qualys which has set out its alternative vision based on building a new generation using open source development.
E-mails stolen by hactivist group Anonymous indicate that the security company it targeted was proposing to make a “new breed of rootkit” and that it passed along the plan to a technology firm that caters to the federal government.
McAfee, which will soon be an Intel subsidiary, and Wind River, which already is one, Wednesday announced they are hardening the security of industrial commercial operating systems supplied by Wind River to makers of products such as automated teller...
U.S senators will introduce legislation this year targeting websites that traffic in digital piracy or counterfeited goods, said the primary sponsor of a controversial bill proposed in 2010 that would give government agencies more authority to shut d...
Most Popular Reviews
- 1 Samsung's Galaxy Alpha review: A peek into the Galaxy S6
- 2 Samsung Galaxy Note 4 review: The busiest, biggest and best Samsung phablet
- 3 Aldi's $279 Bauhn Sphere review: Disappointing
- 4 Nokia Lumia 735 review: Perfectly ordinary
- 5 Bowers & Wilkins P5 (Series 2) review: For elegant sound
Best Deals on GoodGearGuide
Latest News Articles
- US lawmakers to Europe: Don't break up Google
- Hacking Team surveillance malware masquerades as legitimate bookmark manager
- UK network BT mulls mobile return to fuel quad-play competition
- EU sees harmonizing telecoms and online content rules key to €315B economic growth plan
- Microsoft fingered as company forced to pay $136M in back taxes in China
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTStudio Design ManagerVIC
- FTMarketing Solutions ManagerNSW
- FTPartnership Manager - MediaNSW
- CCTech Support | IT Services Firm - Ad hoc Projects - Echuca AreaVIC
- CCTech Support | IT Services Firm - Ad hoc Projects - Port Augusta / Whyalla AreaSA
- FTAccount ExecutiveNSW
- FTDigital Account ManagerNSW
- FTStudio Design ManagerVIC
- FTSEO Content ExecutiveVIC
- CCStrategic Partner ManagerNSW
- FTProgram Manager - Integration & SolutionsNSW