After Symantec blew the lid on Regin on Sunday, computer security experts and companies are revealing information that has lead to suspicions that the U.S. and U.K. are involved.
Malware that Symantec says was probably developed by a nation state may have been used for as long as eight years, a length of time that underscores the challenges the security industry faces in detecting advanced spying tools.
Symantec researchers have identified a particularly sophisticated piece of malware, called "Regin" that was likely developed by a nation state and has been used to spy on governments, infrastructure operators, businesses, researchers and individuals ...
For the first time since Stuxnet was discovered in 2010, researchers have publicly named the worm's original victims: five Iranian companies involved in industrial automation.
A coalition of security vendors has disrupted the activities of a sophisticated group of attackers tied to China that, over the past six years, infiltrated the computers of many Fortune 500 companies, journalists, environmental groups, software compa...
A type of distributed denial-of-service attack, DNS amplification, has risen sharply, according to new research from Symantec.
Dropbox's file storage service was used for a tricky phishing attack, although the service was quick to shut down it down, according to Symantec.
A group of security companies say a collaborative effort has helped counter several hacking tools used by a China-based group most known for provoking strong condemnation from Google four years ago.
Security vendor Symantec is splitting into two companies, with one focused on security and the other on information management.
A leaked programming manual for interacting with the physical components of automated teller machines might have helped attackers create malware programs that were used to steal cash from ATMs in various parts of the world this year.
Taking a cue from Hewlett-Packard and eBay, Symantec is said to be in talks to carve out the company into two entities.
Computer security company Symantec is making its interim CEO its permanent CEO.
The hackers behind the Kelihos botnet are trying to capitalize on users' increased awareness about the security of Apple online accounts through a new phishing campaign.
Cybercriminals are using a new information-stealing malware program to target companies from the automobile industry in Europe, security researchers warned.
Symantec will consolidate its cluttered Norton line of security software, folding nine products into one online service that can be used across desktop computers and mobile devices.
Most Popular Reviews
- 1 Samsung's Galaxy Alpha review: A peek into the Galaxy S6
- 2 Samsung Galaxy Note 4 review: The busiest, biggest and best Samsung phablet
- 3 Aldi's $279 Bauhn Sphere review: Disappointing
- 4 Nokia Lumia 735 review: Perfectly ordinary
- 5 Bowers & Wilkins P5 (Series 2) review: For elegant sound
Best Deals on GoodGearGuide
Latest News Articles
- UK network BT mulls mobile return to fuel quad-play competition
- EU sees harmonizing telecoms and online content rules key to €315B economic growth plan
- Microsoft fingered as company forced to pay $136M in back taxes in China
- Kraken to help probe missing bitcoins in MtGox liquidation
- UN committee calls on countries to protect right to privacy
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCTech Support | IT Services Firm - Ad hoc Projects - Echuca AreaVIC
- FTProgram Manager - Integration & SolutionsNSW
- CCTech Support | IT Services Firm - Ad hoc Projects - Port Augusta / Whyalla AreaSA
- FTPartnership Manager - MediaNSW
- FTAccount ExecutiveNSW
- FTStudio Design ManagerVIC
- FTSEO Content ExecutiveVIC
- FTMarketing Solutions ManagerNSW
- FTDigital Account ManagerNSW
- FTStudio Design ManagerVIC
- CCStrategic Partner ManagerNSW