Microsoft has seen a dramatic drop in the number of computers infected with Waledac, a piece of malicious software affiliated with a botnet that was once responsible for a massive amount of spam.
Database security is rife with pitfalls, according to 430 Oracle database administrators surveyed by the Independent Oracle Users Group.
Criminals who use the Zeus banking crimeware may be working on an new angle: corporate espionage.
The Zeus botnet remains a robust network that is difficult to destroy despite an international sting operation that saw dozens arrested this week for allegedly stealing money from online bank accounts.
U.S. authorities dealt a significant blow to the most successful computer crime organization this week, but it's unclear whether the masterminds behind the Zeus malware will ever be brought to justice.
Suspects charged with stealing more than US$9.4 million from U.K. banks using the Zeus botnet apparently spent more time figuring out the logistics of stealing the money than they did on securing their cyber operation.
U.K. police rounded up 19 people Tuesday in a pre-dawn raid targeting a criminal network using the Zeus banking trojan.
A new law makes it illegal in California to maliciously impersonate someone online.
A Venezuelan man was sentenced to 10 years in prison Friday for stealing and then reselling more than 10 million minutes of Internet phone service.
Beginning Sept. 30, Visa will require merchants and related businesses to conduct wireless security scans to prove compliance with version 1.2 of the PCI Data Security Standard (PCI DSS) which is designed to safeguard cardholder data from wireless th...
Two hackers convicted of defacing Comcast's website two years ago were sentenced Friday to 18 months in prison.
The FBI has launched an investigation into the "Here you have" worm, which disrupted corporate e-mail systems in the U.S. two weeks ago.
Google is at its wit's end dealing with illegal sellers of prescription drugs that market medicines on its ad network, so it has decided to take some of these allegedly rogue advertisers to court.
A highly sophisticated computer worm that has spread through Iran, Indonesia and India was built to destroy operations at one target: possibly Iran's Bushehr nuclear reactor.
An Internet standards group has approved an electronic crimes reporting format, which may eventually give security researchers a cohesive, broad set of data to gauge online crime.
Latest News Articles
- Activists want net neutrality, NSA spying debated at Brazil Internet conference
- Google invites Glass wearers to brave LA's beaches
- Telerik frees HTML5 collection of components
- Space X rocket en route to ISS with space laser cargo
- AMD steers clear of low-cost tablet market
Most Popular Articles
- 1 Top 5 reasons to hate the Samsung Galaxy S5
- 2 What's the difference between an Intel Core i3, i5 and i7?
- 3 Windows 7 Home Premium vs. Windows 7 Professional
- 4 Laser vs. inkjet printers: which is better?
- 5 Five flaws in Samsung Galaxy S5's TouchWiz
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.