One of the first things a malware analyst does when encountering a suspicious executable file is to extract the text strings found inside it, because they can provide immediate clues about its purpose. This operation has long been considered safe, bu...
Cybercriminals are increasingly infecting computers with malware that resides only in memory in order to make their attacks harder to detect.
The cybercriminal gang behind the Kelihos botnet is tricking users into installing malware on their computers by appealing to pro-Russian sentiments stoked by recent international sanctions against the country.
Cybercriminals are in the process of rebuilding the Gameover Zeus (GOZ) botnet, which law enforcement authorities took over in June, and recent research suggests that they've had some success, especially in the U.S.
It's generally accepted that antivirus programs provide a necessary protection layer, but organizations should audit such products before deploying them on their systems because many of them contain serious vulnerabilities, a researcher warned.
A vulnerability present in most Android devices allows apps to initiate unauthorized phone calls, disrupt ongoing calls and execute special codes that can trigger other rogue actions.
An unknown person or group reportedly stole the cryptographic key used by Nokia to digitally sign applications for Symbian OS and extorted millions of euros from the company in 2007 by threatening to make the key public.
A newly discovered vulnerability that allows spying on encrypted SSL/TLS communications has been identified and fixed in the widely used OpenSSL library.
The recent effort to disrupt the Gameover Zeus botnet includes plans for Internet service providers to notify victims, but some security researchers think ISPs should play an even bigger role in the future by actively quarantining infected computers ...
Microsoft has toughened its criteria for classifying programs as adware and gave developers three months to conform with the new principles or risk having their programs blocked by the company's security products.
Tesla Motors accounts are protected only by simple passwords, making it easy for hackers to potentially track and unlock cars, according to a security researcher.
A new commercial tool designed to allow cybercriminals to easily transform legitimate Android applications into malicious software has hit the underground market, paving the way for cheap and easy development of sophisticated Android malware.
Tumblr now allows users to encrypt their connections with the microblogging service, but the feature is only offered as an option for now.
Over the past several months security researchers have found serious vulnerabilities in many mobile advertising libraries that could be exploited to abuse the permissions of Android apps or to execute unauthorized code on users' devices. The risks re...
A team of malware developers is preparing to sell a new ransomware program that encrypts files on infected computers and asks victims for money to recover them, according to a volunteer group of security researchers who tracked the development of the...
Most Popular Reviews
- 1 Bose SoundLink on-ear Bluetooth headphones
- 2 Apple iPhone 6 Plus: An in depth review
- 3 Medion Akoya P2214T (MD99430) hybrid laptop
- 4 Motorola Moto G (2nd Gen.) android smartphone
- 5 HTC One Mini 2 android smartphone
Best Deals on GoodGearGuide
Latest News Articles
- FCC's Wheeler said to mull hybrid approach to net neutrality
- Oppo R5: World's thinnest phone at 4.85mm coming to Australia
- Google project aims to preserve privacy when collecting software stats
- Major banks ready their own mobile payment apps
- Android creator Andy Rubin leaving Google
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTBusiness development manager - retargettingNSW
- FTDigital Account ExecutiveNSW
- CCWeb / Mobile Developer - Magento - HTML5, CSS - Excellent CMS SkillsNSW
- FTMarketing Communications Operations Manager - Global Tech Market leaderNSW
- FTChief Information Officer - CSIROACT
- CCStrategic Partner ManagerNSW
- FTStudio Design ManagerVIC
- FTBusiness ManagerNSW
- FTMarketing Solutions ManagerNSW
- FTAccount ExecutiveNSW
- FTDigital PR SpecialistNSW
- FTPartner Marketing Communications Manager - Leading Global Tech BrandNSW