A feature in the Twitter API (application programming interface) can be abused by attackers to launch credible social engineering attacks that would give them a high chance of hijacking user accounts, a mobile application developer revealed Wednesday...
Hackers could use vulnerable charging stations to prevent the charging of electric vehicles in a certain area, or possibly even use the vulnerabilities to cripple parts of the electricity grid, a security researcher said during the Hack in the Box co...
Thousands of wireless IP cameras connected to the Internet have serious security weaknesses that allow attackers to hijack them and alter their firmware, according to two researchers from security firm Qualys.
The high-end Canon EOS-1D X camera can be hacked for use as a remote surveillance tool, with images remotely downloaded, erased and uploaded, a researcher said during the Hack in the Box security conference in Amsterdam on Wednesday.
Russian Web search firm Yandex launched a public DNS (Domain Name System) resolution service on Thursday that leverages the company's existing website scanning technology to block access to malicious and adult-rated sites.
A new piece of malware that infects point-of-sale (POS) systems has already been used to compromise thousands of payment cards belonging to customers of U.S. banks, according to researchers from Group-IB, a security and computer forensics company bas...
The password encryption algorithm used in some recent versions of the Cisco IOS operating system is weaker than the algorithm it was designed to replace, Cisco revealed earlier this week.
An anonymous researcher created a massive botnet by hijacking about 420,000 Internet-accessible embedded devices with default or no login passwords and used it to map the entire Internet.
The majority of email and Web gateways, firewalls, remote access servers, UTM (united threat management) systems and other security appliances have serious vulnerabilities, according to a security researcher who analyzed products from multiple vendor...
German government officials including Chancellor Angela Merkel could soon be communicating about classified matters using BlackBerry Z10 smartphones equipped with a new micro-SD card from SecuSmart.
Uniscon's IDgard, a service for securely exchanging documents between companies and their clients or partners, uses two-factor authentication and stores only its customers' encrypted data on the server, with no passwords or hashes for hackers to stea...
Professional social networking service LinkedIn won the dismissal of a lawsuit seeking damages on behalf of premium users who had their log-in passwords exposed as a result of a security breach of the company's servers last year.
By displaying more information on the screen of the new Digipass 870 card reader about transactions the device is used to secure, Vasco Data Security hopes to decrease the effectiveness of social engineering.
Fujitsu Technology Solutions has named European bank UniCredit as the first major customer for its PalmSecure authentication system, which is on display at the Cebit trade show in Hanover, Germany, this week.
Dell can trump Cisco in the information-technology security market, say Dell's executives in describing how the company with its multifaceted approach will hold an edge against some powerful rivals that also include HP and IBM.
Most Popular Reviews
- 1 Microsoft Surface Pro 3 Windows 8.1 tablet
- 2 Medion Akoya E4110 (MD 8239) desktop PC
- 3 Samsung Galaxy Tab S (10.5) 4G review
- 4 Dell Inspiron 11 3000 Series convertible laptop
- 5 Kogan Agora 4G review
Best Deals on GoodGearGuide
Latest News Articles
- FBI, Secret Service studying 'scope' of reported bank cyberattacks
- Retailers urged to defend against 'Backoff' point-of-sale malware
- HTC Desire 610 smartphone
- Round LG G Watch R has Plastic-OLED display, heart monitor and is waterproof
- IBM Watson now answers your questions before you ask
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTSearch Account ManagerNSW
- FTInformation Services ManagerNZ
- FTAccount Manager Programmatic Trading DeskNSW
- FTMarketing Communications Executive - B2BNSW
- CCL2 Technical Support Engineer - RightFax/MessagingVIC
- FTMachine Learning | JAVA | San Fran based global Company | SydneyNSW
- FTChief Information OfficerNSW