Using a new API announced by Amazon Web Services, developers can use Amazon.com, Facebook, or Google's sign-in systems for their cloud-based apps.
Twitter's SMS-based, two-factor authentication feature could be abused to lock users who don't have it enabled out of their accounts if attackers gain access to their log-in credentials, according to researchers from Finnish antivirus vendor F-Secure...
A new variant of the Citadel financial malware is targeting users of the Payza online payment platform by launching local in-browser attacks to steal their credentials, according to researchers from security firm Trusteer.
Colleges and universities are being encouraged to scrutinize their systems to keep them from being hijacked in DDoS (distributed denial-of-service) attacks.
Adobe has warned users of its ColdFusion application server platform of a critical vulnerability that could give unauthorized users access to sensitive files stored on their servers.
Domain registrar Name.com forced its customers to reset their account passwords on Wednesday following a security breach on the company's servers that might have resulted in customer information being compromised.
SecurEnvoy has upgraded its SMS-based system for two-factor authentication with the ability for users to receive one-time passwords via a landline telephone call and enter them using the telephone keys.
Amazon Web Services (AWS) is looking to expand its security offerings with hosted intrusion protection appliances and more extensive encryption features, as it looks to increase the level of protection users can get in its cloud.
Getting hacked on Twitter is fast becoming a rite of passage for big corporations, but Tuesday's attack on the Associated Press could be a tipping point and shows that social networks must do more to keep their users safe, security experts said.
Even though the majority of data breaches continue to be the result of financially motivated cybercriminal attacks, cyberespionage activities are also responsible for a significant number of data theft incidents, according to a report that will be re...
Security researchers from Russian cybercrime investigations company Groub-IB have recently identified a new piece of malware designed to steal login credentials from specialized software used to trade stocks and other securities online.
Consumers often fail to perform transactions online due to authentication failure. But while they struggle, they also distrust websites with weak authentication procedures.
A feature in the Twitter API (application programming interface) can be abused by attackers to launch credible social engineering attacks that would give them a high chance of hijacking user accounts, a mobile application developer revealed Wednesday...
Hackers could use vulnerable charging stations to prevent the charging of electric vehicles in a certain area, or possibly even use the vulnerabilities to cripple parts of the electricity grid, a security researcher said during the Hack in the Box co...
Thousands of wireless IP cameras connected to the Internet have serious security weaknesses that allow attackers to hijack them and alter their firmware, according to two researchers from security firm Qualys.
Most Popular Reviews
- 1 Bose SoundLink on-ear Bluetooth headphones
- 2 Apple iPhone 6 Plus: An in depth review
- 3 Medion Akoya P2214T (MD99430) hybrid laptop
- 4 Motorola Moto G (2nd Gen.) android smartphone
- 5 HTC One Mini 2 android smartphone
Best Deals on GoodGearGuide
Latest News Articles
- Wi-Fi Passpoint standard now knits together SF, San Jose, London
- Big Data Digest: Rise of the think-bots
- FCC pushes TV spectrum auction to 2016 after legal challenge
- Apple mum as Mac owners tussle with Yosemite over Wi-Fi problems
- Apple Pay tops Tim Cook's to-do list in China
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTPartner Marketing Communications Manager - Leading Global Tech BrandNSW
- CCConsumer Product Marketing ManagerNSW
- FTBusiness ManagerNSW
- FTDigital Account ExecutiveNSW
- FTDigital PR SpecialistNSW
- FTMarketing Communications Operations Manager - Global Tech Market leaderNSW
- FTAccount ExecutiveNSW
- FTTechnical Marketing ManagerNSW
- FTBusiness development manager - retargettingNSW