Attackers are exploiting a new and unpatched vulnerability in Windows XP and Windows Server 2003 that allows them to execute code with higher privileges than they have access to.
Facebook on Friday moved ahead with some proposed changes to its privacy policies to clarify that users' posts on the site can be used in advertisements, but that users have controls to limit their appearance.
A malicious software program found in ATMs in Mexico has been improved and translated into English, which suggests it may be used elsewhere, according to security vendor Symantec.
Some people think a lot can go wrong if you have your emails pass through LinkedIn's servers with the company's new Intro technology.
Cisco Systems released software security updates Wednesday to address denial-of-service and arbitrary command execution vulnerabilities in several products, including a known flaw in the Apache Struts development framework used by some of them.
Vulnerabilities in the management interfaces of some wireless router and network-attached storage products from Netgear expose the devices to remote attacks that could result in their complete compromise, researchers warn.
Embarrassing photos, bad poetry, MS Paint art...what you keep in your Dropbox account is your business. Two-factor authentication can help keep it that way.
After releasing the first version of Knox security software after a long testing period, Samsung is working on version 2.0.
D-Link will address by the end of October a security issue in some of its routers that could allow attackers to change the device settings without requiring a username and password.
Google said Wednesday it plans to reward developers for developing proactive security improvements for some of the most widely used open-source software programs.
Latest News Articles
- Dick Smith awards SIM-enabled tablet purchases with $30 Globalgig credit
- Twitter, Deutsche Telekom team on Android
- China bans banks from trading in Bitcoin
- Studio Proper PA1 Bluetooth speaker
- Two arrested in Germany for hacking computers they used to generate bitcoins
Most Popular Articles
- 1 What's the difference between an Intel Core i3, i5 and i7?
- 2 Laser vs. inkjet printers: which is better?
- 3 Windows 7 Home Premium vs. Windows 7 Professional
- 4 How do I connect my TV to the Internet?
- 5 Samsung’s 2013 Smart TVs: everything you need to know
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
Best Deals on GoodGearGuide
Best Deals on PCWorld
- TabletsView all »
- NotebooksView all »
- Mobile PhonesView all »
- Printers & ScannersView all »
- Networking, Wireless & VoIPView all »