In an attempt to block email spoofing attacks on yahoo.com addresses, Yahoo began imposing a stricter email validation policy that unfortunately breaks the usual workflow on legitimate mailing lists.
Organizations can now add machine-generated data to their palate of information sources that can be aggregated and analyzed, thanks to a new connector jointly developed by Tableau Software, a provider of business intelligence software, and Splunk, wh...
Explosive revelations in the past six months about the U.S. government's massive cyber-spying activities have spooked individuals, rankled politicians and enraged privacy watchdogs, but top IT executives aren't panicking -- yet.
The PCI Security Standards Council released version 3.0 of the PCI Data Security Standard (PCI DSS) and corresponding Payment Application Data Security Standard (PA-DSS), adding new security requirements and guidance for payment-card industry organiz...
Data encryption could help enterprises protect their sensitive information against mass surveillance by governments, as well as guard against unauthorized access by ill-intended third parties, but the correct implementation and use of data encryption...
Aiming to better address the security needs of businesses of all sizes that are facing increasingly complex attacks, McAfee has added two endpoint security suites to its product lineup.
Even though the majority of data breaches continue to be the result of financially motivated cybercriminal attacks, cyberespionage activities are also responsible for a significant number of data theft incidents, according to a report that will be re...
McAfee is enhancing its business security platform by adding near real-time querying capabilities to its ePolicy Orchestrator software and by integrating it with its security information and event management (SIEM) product to automatically initiate e...
Turktrust, the Turkish certificate authority (CA) responsible for issuing an intermediate CA certificate that was later used to generate an unauthorized certificate for google.com, claims that the bad Google certificate was not used for dishonest pur...
Public companies may need to look more closely at their exposure to cyberattacks after new guidelines were released this week by the U.S. Securities and Exchange Commission.
Failing an audit sounds like the last thing any company wants to happen. But that's because audits are seen by many as the goal of a security program. In reality, audits are only the means of testing whether enforcement of security matches the polici...
VMware has released a new version of its Compliance Checker tool, which allows IT staff to to test the security of its vSphere 4.1 hosts, the <a href="http://blogs.vmware.com/security/2011/09/vmwares-cpc-releases-another-free-compliance-checker.html"...
Google has started to move e-mail security features from its Postini service directly into its Google Apps collaboration and communication suite.
France's High Authority for the Distribution of Works and the Protection of Rights on the Internet (Hadopi) has prosecuted no one for illegal file sharing in the nine months since it began operating under a so-called "three strikes" copyright enforce...
Oracle may be subtly misleading customers about the severity of some of the vulnerabilities found in its database software, according to researchers from database security software provider Application Security (AppSec).
Latest News Articles
- NSA spying revelations have tired out China's Huawei
- Brazil's senate passes Internet legislation ahead of NETmundial conference
- Aldi to sell Medion Android tab for sub-$200
- US to vote on sharp increase in broadband subsidies
- Coding error protects some Android apps from Heartbleed
Most Popular Articles
- 1 What's the difference between an Intel Core i3, i5 and i7?
- 2 Windows 7 Home Premium vs. Windows 7 Professional
- 3 Laser vs. inkjet printers: which is better?
- 4 How do I connect my TV to the Internet?
- 5 How to play DVD movies on your Nintendo Wii
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.