Symantec researchers have identified a particularly sophisticated piece of malware, called "Regin" that was likely developed by a nation state and has been used to spy on governments, infrastructure operators, businesses, researchers and individuals ...
For the first time since Stuxnet was discovered in 2010, researchers have publicly named the worm's original victims: five Iranian companies involved in industrial automation.
A coalition of security vendors has disrupted the activities of a sophisticated group of attackers tied to China that, over the past six years, infiltrated the computers of many Fortune 500 companies, journalists, environmental groups, software compa...
A type of distributed denial-of-service attack, DNS amplification, has risen sharply, according to new research from Symantec.
Dropbox's file storage service was used for a tricky phishing attack, although the service was quick to shut down it down, according to Symantec.
A group of security companies say a collaborative effort has helped counter several hacking tools used by a China-based group most known for provoking strong condemnation from Google four years ago.
Security vendor Symantec is splitting into two companies, with one focused on security and the other on information management.
A leaked programming manual for interacting with the physical components of automated teller machines might have helped attackers create malware programs that were used to steal cash from ATMs in various parts of the world this year.
Taking a cue from Hewlett-Packard and eBay, Symantec is said to be in talks to carve out the company into two entities.
Computer security company Symantec is making its interim CEO its permanent CEO.
The hackers behind the Kelihos botnet are trying to capitalize on users' increased awareness about the security of Apple online accounts through a new phishing campaign.
Cybercriminals are using a new information-stealing malware program to target companies from the automobile industry in Europe, security researchers warned.
Symantec will consolidate its cluttered Norton line of security software, folding nine products into one online service that can be used across desktop computers and mobile devices.
Many malicious software programs used to make a quick exit on virtual machines, a tactic designed to avoid a security check. But that isn't the case anymore, according Symantec research.
Symantec has released a patch for privilege escalation flaws in its Endpoint Protection product, and the company which found the issues released the exploit code on Tuesday.
Most Popular Reviews
- 1 Playing chicken with a Tesla Model S
- 2 Audi TT (2015) review: A smarter take on the sports coupe
- 3 Microsoft Lumia 640 review: Honouring Nokia's legacy
- 4 Apple Watch review: saving time
- 5 Samsung SUHD smart TV (JS9500) review
Join the Good Gear Guide newsletter!
Deals on Good Gear Guide
- Networking, Wireless & VoIP
Deals on Good Gear Guide
Latest News Articles
- Samsung faces lawsuit in China over bloatware on phones
- Reddit sections go dark after exit of staffer
- Ford Focus ST (2015) review: Absolutely mental styling, engine, handling
- Microsoft buries hatchet with Kyocera, ending litigation
- Plex hacker demands Bitcoin ransom for return of data
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.