A 19-year old New Jersey man this week was sentenced this week to a year and a day in federal prison for hacking into the Church of Scientology's Web site in Jan. 2008.
Shares of security vendor Fortinet surged 33 percent Wednesday as the company made its debut on the public markets.
Microsoft today denied that it has built a backdoor into Windows 7, a concern that surfaced yesterday after a senior National Security Agency (NSA) official testified before Congress that the agency had worked on the operating system.
Cyberattacks on the U.S. Department of Defense -- many of them coming from China -- have jumped sharply in 2009, a U.S. congressional committee reported Thursday.
House lawmakers introduced a bill that would restrict the use of peer-to-peer technology on government networks in response to several embarrassing data leaks.
The National Security Agency (NSA) worked with Microsoft on the development of Windows 7, an agency official acknowledged yesterday during testimony before Congress.
Fraudsters may have a hot deal waiting for them in the form of an obscure Chinese domain name that's for sale on the Internet.
Windows users running 64-bit versions of the operating system are less likely to get infected by attack code, Microsoft's security team said yesterday.
A new report from a mobile security vendor details how the most popular smartphones, including the iPhone, are very vulnerable to man-in-the-middle attacks, carried out via public Wi-Fi connections.
Nations that want to disrupt their enemies' banking, media and government resources don't need their own technical skills; they can simply order botnet attack services from cybercriminals.
Microsoft has settled a lawsuit with a former employee that it once charged with fraud, misappropriation of trade secrets and breach of contract.
An effort is underway to clean up tens of thousands of computers infected with malicious software known for churning out thousands of spam messages per hour.
Workers at T-Mobile UK have been selling customer data to brokers who work for the competition, T-Mobile and the U.K.'s Information Commissioner's Office said on Tuesday.
U.K. police are hailing the sentencing of four people who used a sophisticated Trojan horse program to siphon money out of online bank accounts and send it to Eastern European countries and Russia.
In the face of mounting threats from hackers, MasterCard will use mobile phones to improve security for online transactions, the company said on Monday.
Latest News Articles
- IT security is national security -- but you're not alone
- Exclusive: Google's Project Loon tests move to LTE band in Nevada
- Enterprise who? Google says little about Apps, business cloud services in Q1 report
- Samsung teams with GlobalFoundries on 3D chips
- World Tech Update: Google buys drone maker Titan Aerospace and NHK shows off 8K television
Most Popular Articles
- 1 Top 5 reasons to hate the Samsung Galaxy S5
- 2 Windows 7 Home Premium vs. Windows 7 Professional
- 3 What's the difference between an Intel Core i3, i5 and i7?
- 4 Laser vs. inkjet printers: which is better?
- 5 How do I connect my TV to the Internet?
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.