A worm-like type of malicious software has been found targeting Apache Tomcat, an open-source Web server application, according to Symantec.
Attackers are actively exploiting a known vulnerability to compromise JBoss Java EE application servers that expose the HTTP Invoker service to the Internet in an insecure manner.
A malicious software program found in ATMs in Mexico has been improved and translated into English, which suggests it may be used elsewhere, according to security vendor Symantec.
The cybercriminals behind ZeroAccess, one of the largest botnets in existence, have lost access to more than a quarter of the infected machines they controlled because of an operation executed by security researchers from Symantec.
Apple, Microsoft, Google and Cisco are flush with cash, and so are many other tech companies
Microsoft released two optional security updates Tuesday to block digital certificates that use the MD5 hashing algorithm and to improve the network-level authentication for the Remote Desktop Protocol.
A steady stream of questionable applications is flowing daily into Google's Play store for Android devices, according to security vendor Symantec.
Hackers are now using a critical vulnerability in Android to modify legitimate smartphone applications, putting users at risk of being spied on.
Google fixed one Wi-Fi security problem with its wearable computer Glass, but Symantec says there's another problem, which has been a long-known weakness in wireless networking.
A new piece of malware designed to delete files from hard disk drives and render computers unable to boot targets South Korean users, according to researchers from security firm Symantec.
One well-known gang of hackers contributed to cyberattacks on South Korea on Tuesday, which coincided with the 63rd anniversary of the start of the Korean War, according to analysis from Symantec.
Symantec today said the updated version of its Data Loss Prevention (DLP) suite will be able to monitor confidential data sent by e-mail via Apple iPhones and iPads.
Trusting the cloud to handle sensitive transactions and security services isn't for every enterprise, but organisations from banks to app developers are starting to give it a try.
We all know that relying on a simple user ID and password combination is fraught with peril. One alternative is to use one of the single sign-on solutions we reviewed last year, but there are less expensive options that could also be easier to instal...
Previously unknown Mac OS X spyware, signed with a valid Apple Developer ID, has turned up on the laptop of an activist from Angola at a human rights conference in Norway.
Most Popular Reviews
- 1 Review: TCL C1 series 4K TV
- 2 Sony 75-inch UHD TV (X9400C) review: Sony and Android are a winning duo
- 3 LG 55EG960T OLED UHD TV
- 4 Panasonic Viera UHD TV review: good hardware, fragmented software
- 5 Microsoft Lumia 640 review: Honouring Nokia's legacy
Join the Good Gear Guide newsletter!
Best Deals on Good Gear Guide
Latest News Articles
- Seagate 8TB NAS drive: Review
- Seagate ST1000LX001 review
- Report: Microsoft could debut Xbox One game streaming stick and 'Xbox TV' at E3
- This sticker can wirelessly charge your smartphone or tablet
- Microsoft breaks own design rules in dupe-the-user Windows 10 upgrade tactic
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTNV1, NV2 Network Engineers | Permanent role with diverse Defence projectsACT
- CCTechnology Team Lead / Senior Developer - JavaNSW
- CCData Migration Quality Manager- SAP ECCNSW
- CCInfrastructure Deployment ManagerVIC
- FTSenior Systems EngineerACT
- CCInfrastructure Business AnalystNSW
- CCNetwork Consultant - Bandwidth Assessment | 3 month contract into Defence | NV1+ACT
- FTBusiness Systems Architect - Technical LeadershipWA
- CCInfrastructure and Cloud Project ManagerVIC
- FTService Desk AnaylstNSW
- CCOracle Fusion SOA/BPEL DeveloperVIC
- FTBusiness AnalystVIC
- FTSenior Business Analysts - Payments or Disaster RecoveryVIC
- CCJunior / Mid Level Java Developer - Developing Restful Microservice SolutionsVIC
- FTAgile CoachNSW
- CCDigital Business Analyst (iOS & Android / Web Projects)NSW
- FTSenior .NET DeveloperWA
- CCSenior Change AnalystNSW
- FTSenior Network Engineer - Australian Systems Integrator - Immediate interviewNSW
- FTNV2 Defence Project Manager | Canberra | Major exciting White Paper projectsNSW
- FTScrum MasterVIC
- CCWeb DeveloperACT
- FTTechnical WriterACT
- FTBI / Business Intelligence Designer / ArchitectNSW
- CCProject CoordinatorACT