A coalition of security vendors has disrupted the activities of a sophisticated group of attackers tied to China that, over the past six years, infiltrated the computers of many Fortune 500 companies, journalists, environmental groups, software compa...
Swedish ISP Bahnhof must resume retaining customer communications metadata for police use by the end of November or pay a fine of 5 million Swedish Kronor (US$685,000), the Swedish telecom authority has ruled.
Russia is likely behind a long-running computer spying campaign, although the stealthy attacks leave fewer clues than other state-sponsored attacks, according to a new report from FireEye.
A diversification of targets for a clever keylogging attack suggests that several hacking groups may be using the "ScanBox" framework, which spies on users without installing malicious software.
One of the first things a malware analyst does when encountering a suspicious executable file is to extract the text strings found inside it, because they can provide immediate clues about its purpose. This operation has long been considered safe, bu...
The Tor Project has flagged a server in Russia after a security researcher found it slipped in malware when users were downloading files.
Social media app Whisper, a supposedly anonymous way for users to post online confessions, is now facing privacy questions from a U.S. senator after reports that it tracks locations of users and has shared their information with other companies.
The number of computers in North America infected by the Backoff malware, which is blamed for a string of payment card breaches, has risen sharply, according to research from network security company Damballa.
A cyberespionage group has been using advanced spear-phishing techniques to steal email log-in credentials from the employees of military agencies, embassies, defense contractors and international media outlets that use Office 365's Outlook Web App.
Adobe Systems said it is now encrypting data it collects about certain e-books after facing criticism earlier this month for not protecting the data.
Facebook and Yahoo have developed a mechanism to prevent the owners of recycled email addresses from hijacking accounts that were registered on other sites using those addresses in the past.
The size and volume of distributed denial-of-service attacks has exploded in the past year, with a 389 percent increase in average attack bandwidth between the third quarter of 2013 and the third quarter of 2014, according to an Internet security rep...
Many companies set up subdomains for use with external services, but then forget to disable them when they stop using those services, creating a loophole for attackers to exploit.
Vietnamese cybersecurity authorities are hunting hackers believed to be responsible for the country's biggest-ever online attack last week, according to the founder of a security website in Hanoi.
Apple will stop support next week for an encryption protocol found to contain a severe vulnerability, the company said on Wednesday.
Most Popular Reviews
- 1 Samsung's Galaxy Alpha review: A peek into the Galaxy S6
- 2 Samsung Galaxy Note 4 review: The busiest, biggest and best Samsung phablet
- 3 Aldi's $279 Bauhn Sphere review: Disappointing
- 4 Nokia Lumia 735 review: Perfectly ordinary
- 5 Bowers & Wilkins P5 (Series 2) review: For elegant sound
Best Deals on GoodGearGuide
Latest News Articles
- Apple delivers another Yosemite beta as WiFi issues persist
- UpCloud bets on storage performance, US datacenter to dent market
- Critical XSS flaws patched in WordPress and popular plug-in
- EU net neutrality legislation under threat from Italian proposals, says rights group
- Molecular flash memory could store massive data
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTProgram Manager - Integration & SolutionsNSW
- FTMarketing Solutions ManagerNSW
- FTChief Information Officer - CSIROACT
- FTAccount ExecutiveNSW
- FTStudio Design ManagerVIC
- FTSEO Content ExecutiveVIC
- CCTech Support | IT Services Firm - Ad hoc Projects - Port Augusta / Whyalla AreaSA
- CCStrategic Partner ManagerNSW
- CCWeb / Mobile Developer - Magento - HTML5, CSS - Excellent CMS SkillsNSW
- FTDigital Account ManagerNSW
- FTStudio Design ManagerVIC
- FTPartnership Manager - MediaNSW