Users who have Dell Windows-based laptops, desktops, tablets and other devices that were bought before August should check if their systems have the self-signed eDellRoot certificate that can compromise their private communications.
SentinelOne has added a feature to its endpoint detection products that can restore files encrypted by cybercriminals, a common type of attack known as ransomware.
Cisco is working to build the confidence of prospective customers in its products, two years after the NSA spying disclosures seeded doubt, particularly in China.
Microsoft combines the attack protection, detection and response features built into Windows 10, Office 365, Azure and the Microsoft Enterprise Mobility Suite to help enterprises improve their operational security posture.
Security researchers say a second experiment showing how easy it is to write ransomware for Apple Macs isn't surprising, so it's likely that hackers will eventually target Apple computers with it.
Adobe Systems' Flash plugin gets no love from anyone in the security field these days. A new study released Monday shows just how much Flash is favored by cybercriminals to sneak their malware onto computers.
IBM may be the fastest-growing vendor in the worldwide security software market, but it's also the owner of the world's largest source of spam.
Google and Yahoo are expanding their use of a successful system used to detect spam.
Thousands of medical devices, including MRI scanners, x-ray machines and drug infusion pumps, are vulnerable to hacking, creating significant health risks for patients, security researchers said this week.
Cisco is tying with a Chinese partner for joint development and better access to the local market, according to a newspaper report.
Microsoft has acquired security company, Adallom, in a bid to give IT departments more control over application access as well as data stored across cloud services.
Security company G Data has identified more than 20 mobile phones that have malware installed despite being marketed as new, according to a research report.
Russian-speaking hackers have breached 97 websites, mostly dating-related, and stolen login credentials, putting hundreds of thousands of users at risk.
World experts in computer science and mathematics spent an afternoon at the Heidelberg Laureate Forum in Germany trying to figure out how the widespread collection of data about consumers can be prevented from causing harm.
A closely watched band of suspected Russian hackers have spied on domestic targets, including two members of the outspoken punk rock band Pussy Riot.
Most Popular Reviews
- 1 2016 Ford Mustang EcoBoost review
- 2 Review: TCL C1 series 4K TV
- 3 Sony 75-inch UHD TV (X9400C) review: Sony and Android are a winning duo
- 4 LG 55EG960T OLED UHD TV
- 5 Panasonic Viera UHD TV review: good hardware, fragmented software
Join the Good Gear Guide newsletter!
Best Deals on Good Gear Guide
Latest News Articles
- Huawei P9 review: lifting photography to another level... sometimes.
- Microsoft's pricey Surface Book is getting stomped by the ancient Surface Pro 3
- Android TV's universal search feature finally works with Netflix
- Facebook takes on critics with political bias class
- Kodi dives into hardware with a Raspberry Pi 3 case perfect for low-cost HTPCs
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTAppian Developer/ArchitectVIC
- CCNetwork EngineerACT
- FTTechnical Business Analyst (Integration background)NSW
- CCSenior IT Automated TesterNSW
- CCWeb Developer (Drupal)SA
- CCAnalyst Programmer (System Backup Operation/UNIX) 160615/AP/791Asia
- CCSenior Java DeveloperACT
- CCBusiness Analyst - TravelNSW
- CCSystem Engineer (DevOps)WA
- CCTenable Security - Technical ConsultantVIC
- CCSAP ABAP - Senior developerVIC
- CCProduct Solution DesignerVIC
- CCSenior Business AnalystACT
- CCMulesoft Integration DeveloperWA
- CCBusiness AnalystVIC
- CCUrgent requirement for a Splunk SMEVIC
- CCIntegration ArchitectACT
- FTBusiness Analyst/Data Analyst Capability ManagerVIC
- CCOffice 365 Project ManagerNSW
- CCOracle iLearning Business AnalystNSW
- CCMobility Developer (iOS or Android)NSW
- CCProject Manager - IT SecurityNSW
- FT.Net Developer (WebAPI / Entity Framework / SQL Server)NSW
- CCProgram Test ManagerNSW
- CCSenior Change Manager, Financial ServicesNSW