Although some like to say "antivirus is dead" because of the explosion in malware that makes signature-based desktop protection harder than ever, start-up Immunet wants to bring new life to antivirus scanning through cloud computing.
A security researcher has published exploit code for the latest Internet Explorer zero-day flaw on the Web and Microsoft is warning that more attacks against the unpatched vulnerability can be expected in-the-wild. One thing seems to be more apparent...
Cybercrime is becoming an ever increasing threat.
This past January, the health organisation Kaiser Permanente reported a theft of an external hard drive from an employee's car. The hard drive contained data on about 15,500 Northern California patients, including their full names, medical record n...
Lock down your PC.
Quick: What's a hacker? A pimply faced teenager in a dark bedroom trying to start World War Three, or a thirty-something professional with mad computer skills?
Dear Facebook, I appreciate your service. I really do.
No one likes to be hated, but if you're running a small business, sometimes you've got to take security measures that will make your employees really angry. You might even have to (gasp) pull some PCs off the Internet, and treat some employees like, ...
Laptop computers have become mobile stores of massive amounts of information. Add to that the proliferation of removable hard drives, and it becomes crystal clear how much sensitive data is on the move in the world, most of it woefully underprotected...
Kaspersky Lab may not be a household name in the United States, but in some parts of the world, it's the most popular consumer antivirus software. In China the company boasts 100 million users, and the software is also popular in Germany, and, of cou...
Do you know how to guard against scareware? How about Trojan horse text messages? Or social network data harvesting?
About two weeks after Google publicly squared off with the Chinese government, the world is still watching for the search company's next step.
If you think spam attacks were bad in 2009, just wait until 2010 gets going.
Rootkits, a type of stealth technology used by malware malefactors, attempt to hide in the dark corners of an infected PC and evade detection. A new post out today from the Microsoft Malware Protection Center shines the spotlight on the evil tools.
If you're concerned about the privacy implications of reading digital books, take a look at a nice guide put up yesterday by the Electronic Frontier Foundation.
Most Popular Reviews
- 1 Synology DiskStation DS215j NAS device
- 2 Fitbit Charge wireless activity tracker
- 3 HP Stream 11 laptop
- 4 B&O BeoPlay A2 portable Bluetooth speaker
- 5 Acer Chromebook 11 (CB3-111)
Best Deals on GoodGearGuide
Latest News Articles
- Coinbase set to launch licensed Bitcoin exchange in the US
- Malaysia Airlines attacked, big data dump threatened
- NIST pledges transparency in NSA dealings over crypto standards
- North Carolina could be next in Google Fiber roll-out
- Conference calls a waste of time? In 1915, this one made history
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.