A computer Trojan that hides its malicious code inside PNG image files counts healthcare organizations in the U.S. among its primary targets.
A new malware program designed to steal payment card details from point-of-sale (PoS) systems is targeting businesses using Oracle Micros products.
A fix has been released for a vulnerability in a widely used piece of code in Android devices, which could cause apps to crash or display unwanted dialog boxes.
Multiple cyberespionage groups are specifically targeting government and military organizations from countries in Asia and the Pacific region with the goal of gathering geo-political intelligence, according to new security research.
In the latest attack involving malicious advertisements, hackers managed to launch Flash Player exploits against the visitors of several popular porn websites.
A suspected malicious advertising attack turned out to be a much deeper compromise of an online advertising company, according to Trend Micro.
Even though its activities were exposed last year, a cyberespionage group dubbed Pawn Storm has ramped up its efforts over the past few months, targeting NATO members and potentially the White House.
Israeli institutions have been targeted by an Arab-speaking hacker group that sought to extract sensitive documents, according to Trend Micro.
A team of hackers that target governments, the military and journalists has turned its attention to the iPhone, according to Trend Micro.
Adobe Systems warned users that hackers are exploiting another unpatched vulnerability in Flash Player -- the third one in the past month -- to infect computers with malware.
Microsoft says German speakers are being targeted by a new variant of a powerful type of malware that steals online banking credentials.
The destructive malware program that the FBI alerted some companies about this week was likely used against Sony Pictures Entertainment, according to technical evidence found by researchers in the program's code.
Facebook has partnered with antivirus firm ESET to offer users the ability to scan their computers for malware directly from inside the social networking site.
A security researcher came across what appears to be a new family of point-of-sale malware that few antivirus programs were detecting.
Attacks that exploit the Shellshock vulnerabilities recently patched in the Bash Unix deliver a malware program that tries to compromise systems running BusyBox, a collection of Unix utilities typically used on embedded devices like routers.
Most Popular Reviews
- 1 Playing chicken with a Tesla Model S
- 2 Audi TT (2015) review: A smarter take on the sports coupe
- 3 Microsoft Lumia 640 review: Honouring Nokia's legacy
- 4 Apple Watch review: saving time
- 5 Samsung SUHD smart TV (JS9500) review
Join the Good Gear Guide newsletter!
Deals on Good Gear Guide
- Networking, Wireless & VoIP
Deals on Good Gear Guide
Latest News Articles
- Austrian court dismisses class action suit against Facebook
- Skype for Business preview adds support for massive meetings, cloud-based phone administration
- The Upload: Your tech news briefing for Wednesday, July 1
- Latest Windows 10 SDK preview helps developers build cooler photo apps
- China tightens grip over the Internet with new security law
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.