IT security firm Qualys has unveiled a free inventory service that can help organizations keep track of all their computers and virtual machines.
Software-defined switches hold a lot of promise for network operators, but new research due to be presented at Black Hat will show that security measures haven't quite caught up yet.
File synchronization services, used to accommodate roaming employees inside organizations, can also be a weak point that attackers could exploit to remain undetected inside compromised networks.
China's control over the Internet is set to expand. In a bid to better police local websites, the country's security forces are establishing offices at the biggest online firms in the country.
Knocking a drone out of the sky is sometimes possible using an invisible weapon -- sound.
For years now, checking the "do-not-track" option on your browser has been little more than wishful thinking on the part of users who care about privacy online. But now a group led by the Electronic Frontier Foundation is looking to make that a more ...
The U.S. Senate could take a preliminary vote as soon as Wednesday on a controversial bill intended to encourage businesses to share cyberthreat information with each other and with government agencies, despite concerns that the legislation would all...
Google's started a car company...Samsung puts $85 million into cancer-victim fund...Apple explores offering phone service...and more tech news.
The U.S. Department of Homeland Security has warned about the privacy implications of a cybersecurity bill that is intended to encourage businesses to share information about cyberthreats with the government.
An improved attack on the firmware in Apple computers makes them vulnerable to hard-to-detect malware without even being connected to a network, according to a Black Hat conference presentation due to be given later this week.
In late 2008, a worm called Conficker began infecting millions of computers, startling the computer security community into action.
Yahoo said Monday it had removed malware from its advertising network, after malicious code there had gone undetected for at least six days.
The U.S. government should deputize private companies to strike back against cyberattackers as a way to discourage widespread threats against the nation's businesses, a former government official says.
Robot hitchiker attacked, abandoned... Nokia sells Here mapping business to German car makers... Spy-spotting software comes to Wall St... and more tech news
Attackers have started exploiting a flaw in the most widely used software for the DNS (Domain Name System), which translates domain names into IP addresses.
Most Popular Reviews
- 1 2016 Ford Mustang EcoBoost review
- 2 Synology DS216+ Review
- 3 Review: TCL C1 series 4K TV
- 4 Sony 75-inch UHD TV (X9400C) review: Sony and Android are a winning duo
- 5 LG 55EG960T OLED UHD TV
Join the Good Gear Guide newsletter!
Best Deals on Good Gear Guide
Latest News Articles
- How to stop hackers from reaching your deleted files
- Six quick steps to start a Digital Detox
- How to upgrade to Windows 10: What you need to know
- Alphabet will work with more auto makers on self-driving cars
- Intel has quietly snuffed out its Project Tango smartphone as it rethinks augmented reality
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTSocial Media AssistantQLD
- CCService Design AnalystNSW
- FTSenior Technical ConsultantVIC
- FTEmbedded Software EngineerWA
- FTPortfolio Project Governance AnalystNSW
- CCContract Analyst Programmer (J2EE/SQL Server) 160812/AP/553Asia
- FTFull stack (back end focus) Java Developer | Defence | NV1ACT
- FTProgram Master SchedulerVIC
- FTDefence Network EngineerACT
- CCBusiness Analyst - Logistic and TransportVIC
- FT1st Level IT Support - Microsoft EnvironmentNSW
- CCSenior Contracts Officer/Procurement -Governmen BckgrndNSW
- CCNetwork Designer/ConsultantVIC
- FTSOE Desktop Engineer - must have SCCM 2012NSW
- FTPortfolio Governance AnalystVIC
- CCProject Engineer -VIC
- FTSystems Engineer | Defence | NV1 / NV2 clearanceACT
- CCNetwork Engineer - NV2 ClearanceVIC
- FTSAS Support SpecialistNSW
- CCBusiness Analyst (NON-IT)WA
- FTDesktop Specialist - Application PackagingACT
- FTApplications Support / Systems Administrator | DefenceACT
- CCSAP BW Hana DeveloperVIC
- CCLead Business AnalystNSW
- CCAgile Performance Tester- Bamboo, Jenkins, Confluence, JiraNSW