Security updates are being distributed for a telematics control unit (TCU) that security researchers showed could be manipulated to remotely apply the brakes of a Corvette, according to the device's French manufacturer.
Three “high risk” vulnerabilities in SAP Mobile could give attackers access to encrypted information stored in mobile devices, security firm Onapsis reported Wednesday.
It's possible for companies to design their encryption systems to allow law enforcement agencies to access customer data with court-ordered warrants while still offering solid security, U.S. Department of Justice officials said.
Two-factor authentication is often held up as a best practice for security in the online world, but Dropbox on Wednesday announced a new feature that's designed to make it even tougher.
Security researchers and hackers gathered in Las Vegas over the past week to show off and learn about the latest vulnerabilities that affect devices and software that the world relies on every day. Black Hat and DEF CON, the world's top security conf...
The U.S. Securities and Exchange Commission has charged 32 defendants with fraud in an international scheme that used stolen, yet-to-be-published press releases from hacked websites to conduct stock trades.
Lenovo isn't doing its reputation any favors with the discovery of another security issue around its pre-loaded PC software.
As if recent research on car hacking wasn't frightening enough, a new study shows yet another danger to increasingly networked vehicles.
The developing world is increasingly using mobile banking apps to move money, but new research shows those apps are often poorly coded and pose security risks.
Released almost two weeks ago, the new Windows 10 operating system already has its first set of security patches.
Nine people face criminal charges in the U.S. for allegedly hacking three press release distributors and stealing yet-to-be-published announcements in a stock trading scheme that authorities say generated about US$30 million in illegal profits.
Oracle published, then quickly deleted, a blog post criticizing third-party security consultants and the enterprise customers who use them.
If you're worried about Big Brother monitoring you from security cameras, Japan has developed eyewear that can keep you anonymous.
Retailer Fred's said Monday it found malware that collected payment card details on two of its servers, but it doesn't appear the data was removed from its systems.
The Asprox botnet, whose malware-spamming activities have been followed for years by security researchers, appears to be gone.
Most Popular Reviews
- 1 Evapolar USB air conditioner review
- 2 LED Lenser P7R Professional Torch review
- 3 Aftershokz Wireless Trekz Titanium Bone Conduction Bluetooth Headphones review
- 4 Review: Periscope users rejoice with Feiyu’s G4 Plus 3-Axis Gimbal for Smartphone video
- 5 2016 Ford Mustang EcoBoost review
Join the Good Gear Guide newsletter!
Latest News Articles
- Evapolar USB air conditioner review
- Hackers have a treasure trove of data with the Yahoo breach
- The so-called Universal Stylus Initiative launches without the three biggest players
- Facebook, Twitter, YouTube get in on presidential debates
- More than half of PCs don't have Windows 10 AU yet, and no one's quite sure why
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTSenior Project Manager | TelecommunicationVIC
- CCService Desk analystSA
- CCInformatica Developer (MDM)NSW
- FTOutbound TelesalesVIC
- CCLAN ConsultantWA
- CCDesktop Infrastructure SpecialistACT
- CCIT Security ArchitectACT
- FTLinux Systems AdministratorNZ
- CCContract Web Developer (160915/WD/vmp)Asia
- FTIT Pre-Sales EngineerSA
- CCNetwork and Security EngineerNSW
- CCBusiness Analyst with change management experienceACT
- FTNetApp Storage ConsultantWA
- CCiOS DeveloperNSW
- CCBusiness AnalystQLD
- CCPMO AnalystNSW
- CCSenior .NET DeveloperVIC
- CCChange and Communications ManagerQLD
- CCContract Junior Programmer (J2EE/SQL) 160927/JP/551Asia
- FTTechnical Business Analyst | Marketing ServicesNSW
- CCNetwork Design Specialist - TelecommunicationsNSW
- FTSenior Front End DeveloperNSW
- CCFull Stack Application Developer - IoT projectsVIC
- FTTeam Leader Full Stack, Python, FinanceNSW
- CCSolutions ArchitectACT