An Italian teenager has found two zero-day vulnerabilities in Apple's OS X operating system that could be used to gain remote access to a computer.
A fresh analysis of documents disclosed by former U.S. intelligence contractor Edward Snowden shows that AT&T has been a much closer and eager partner for the National Security Agency's Internet spying activities than was previously known.
Mozilla wants to make private browsing truly private.
Responding to allegations from anonymous ex-employees, security firm Kaspersky Lab has denied planting misleading information in its public virus reports as a way to foil competitors.
An unpatched vulnerability in the Google Admin application for Android can allow rogue applications to steal credentials that could be used to access Google for Work acccounts.
Google has released another patch for the Stagefright vulnerability after a security firm said the first one didn't fix it.
Installing rogue firmware on embedded devices has long been a concern for security researchers, and it seems that such attacks have started to gain ground with hackers.
Security updates are being distributed for a telematics control unit (TCU) that security researchers showed could be manipulated to remotely apply the brakes of a Corvette, according to the device's French manufacturer.
Three “high risk” vulnerabilities in SAP Mobile could give attackers access to encrypted information stored in mobile devices, security firm Onapsis reported Wednesday.
It's possible for companies to design their encryption systems to allow law enforcement agencies to access customer data with court-ordered warrants while still offering solid security, U.S. Department of Justice officials said.
Two-factor authentication is often held up as a best practice for security in the online world, but Dropbox on Wednesday announced a new feature that's designed to make it even tougher.
Security researchers and hackers gathered in Las Vegas over the past week to show off and learn about the latest vulnerabilities that affect devices and software that the world relies on every day. Black Hat and DEF CON, the world's top security conf...
The U.S. Securities and Exchange Commission has charged 32 defendants with fraud in an international scheme that used stolen, yet-to-be-published press releases from hacked websites to conduct stock trades.
Lenovo isn't doing its reputation any favors with the discovery of another security issue around its pre-loaded PC software.
As if recent research on car hacking wasn't frightening enough, a new study shows yet another danger to increasingly networked vehicles.
Most Popular Reviews
- 1 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 2 Mazda MX-5 (2016) review: Absolute driving purity
- 3 Sony 75-inch UHD TV (X9400C) review: Sony and Android are a winning duo
- 4 LG 55EG960T OLED UHD TV
- 5 Panasonic Viera UHD TV review: good hardware, fragmented software
Join the Good Gear Guide newsletter!
Best Deals on Good Gear Guide
Latest News Articles
- Stock-market jitters have rocked network spending, Cisco says
- Android root malware widespread in third-party app stores
- UCLA just open-sourced a powerful new image-detection algorithm
- Microsoft lets cautious users try more of Windows 10’s leading edge
- A new IoT gateway design could be Bluetooth's ticket to the cloud
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTDigital Marketing Specialist | Media BuyerNSW
- CCWindows System Admin, Administrator, Technical SupportNSW
- CCProject ManagerACT
- CCContract System Analyst (MSSQL/.Net/Mobile App) 160122/SA/vhaAsia
- CCSenior Business Analyst - IT SecurityNSW
- CCJava Development EngineerNSW
- FTTechnical Support Engineer, International SoftwareNSW
- CCContract System Analyst (Network & System Mgt.) 160205/SA/561Asia
- CCWintel Support EngineerNSW
- FTManager, Portfolio GovernanceNSW
- FTSystems Engineer / Administrator - Managed ServicesNSW
- CCContract Analyst Programmer (JAVA/Crystal Report) 160115/AP/vhsAsia
- CCUX DesignerNSW
- FTSenior .NET DeveloperVIC
- CCSenior Project Manager - ComplianceVIC
- CCTest ManagerQLD
- CCDesktop Support Engineer/Service Desk AnalystNSW
- CCContract Junior Programmer (JAVA/Mobile App) 160115/JP/vhaAsia
- CCImmediate iOS Developer RequiredNSW
- CCFront End DeveloperVIC
- CCPython Web Developer - DevOPS EnvironmentVIC
- FTSenior Mobile Developer - IOSNSW
- CCTechnical Business Analyst (Telecommunications) / Melb CBDVIC
- CCIT Performance Test AnalystACT