The cyberattack that resulted in nytimes.com and some other high-profile websites being inaccessible to a large number of users Tuesday started with a targeted phishing attack against a reseller for Melbourne IT, an Australian domain registrar and IT...
A portion of the North American user base of "League of Legends" (LoL) had its account information compromised by hackers, according to Riot Games, the company developing the popular online multiplayer game. Passwords and credit card numbers stored i...
Microsoft released two optional security updates Tuesday to block digital certificates that use the MD5 hashing algorithm and to improve the network-level authentication for the Remote Desktop Protocol.
A feature that allows Android users to authenticate themselves on Google websites without having to enter their account password can be abused by rogue apps to give attackers access to Google accounts, a security researcher has revealed.
Two security researchers at Defcon on Friday revealed the methods they used to hack into car computers and take over the steering, acceleration, brakes and other important functions.
Some D-Link devices that enable remote access to surveillance camera feeds or other potentially sensitive data contain critical vulnerabilities that enable hackers to bypass authentication and access them from the Internet.
A variety of network-controlled home automation devices lack basic security controls, making it possible for attackers to access their sensitive functions, often from the Internet, according to researchers from security firm Trustwave.
Europe’s data privacy watchdog said Friday that a plan to set up a massive database of every non-E.U. citizen entering and leaving the bloc was disproportionate.
A Japanese ministry is conducting an internal investigation after a Google Groups account used for international treaty negotiations was left on its default, publicly viewable settings.
A vulnerability that has existed in Android for the past four years can allow hackers to modify any legitimate and digitally signed application in order to transform it into a Trojan program that can be used to steal data or take control of the OS.
A critical vulnerability that could allow remote attackers to access sensitive enterprise log-in credentials and other data was fixed last week in Crowd, a single sign-on (SSO) and identity management tool used by large organizations to simplify acce...
LinkedIn's domain name was temporarily redirected to a third-party server Thursday, which resulted in a service outage and potentially put user accounts at risk of compromise.
British intelligence agency Government Communications Headquarters (GCHQ) reportedly intercepted the electronic communications of foreign politicians during G20 meetings that took place in London in 2009.
Microsoft is upping the security on Azure with Active Authentication, a new service now in preview which allows enterprises to secure access to hosted applications such as Office 365 with two-factor authentication.
Using a new API announced by Amazon Web Services, developers can use Amazon.com, Facebook, or Google's sign-in systems for their cloud-based apps.
Latest News Articles
- Tor anonymity network to shrink as a result of Heartbleed flaw
- Report: Oracle pushes back against Oregon officials over troubled health care site
- Google Glass to get a workout from Dutch firefighters
- Nokia doesn't want you to get shocked, suspends tablet sales because of faulty charger
- Facebook users targeted by iBanking Android trojan app
Most Popular Articles
- 1 What's the difference between an Intel Core i3, i5 and i7?
- 2 Windows 7 Home Premium vs. Windows 7 Professional
- 3 Laser vs. inkjet printers: which is better?
- 4 How do I connect my TV to the Internet?
- 5 How to play DVD movies on your Nintendo Wii
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
Best Deals on GoodGearGuide
- Notebooks View all »
- $2049 free shipping
- Tablets View all »
- Mobile Phones View all »
- TVs View all »
- Digital Cameras View all »