It’s early but it has been a bad year for personal data exposure already
The high-end Canon EOS-1D X camera can be hacked for use as a remote surveillance tool, with images remotely downloaded, erased and uploaded, a researcher said during the Hack in the Box security conference in Amsterdam on Wednesday.
Two of Japan's major Internet portals were hacked earlier this week, with one warning that as many as 100,000 user accounts were compromised, including financial details.
A new piece of custom malware sold on the underground Internet market is being used to siphon payment card data from point-of-sale (POS) systems, according to security researchers from antivirus vendor McAfee.
Security vendors analyzing the code used in the cyberattacks against South Korea are finding nasty components designed to wreck infected computers.
A website that leaked credit reports of celebrities and government officials last week appears to have a curious link to the malicious banking software known as "Zeus."
A site that published the private information and credit reports of several celebrities and other public figures last week went offline on Sunday. The last person to have his alleged private information exposed on the site was CIA director John Brenn...
A former Tribune Company employee could face as much as 10 years of jail time over federal charges accusing him of conspiring with members of the hacker group Anonymous to hack into a Tribune website.
New research suggests a controversial spyware suite called FinFisher is being used to track activists in more countries than previously thought, including Vietnam and Ethiopia.
A website that provides US consumers with a free annual credit report appears to have been the source used by hackers to download those of celebrities including Beyoncé and government officials including Federal Bureau of Investigation Director Rober...
China's foreign minster on Saturday called on nations to cooperate on Internet security, rather than wage cyberwarfare, as he denied accusations in a recent report that the country's military was behind hacking attacks.
Professional social networking service LinkedIn won the dismissal of a lawsuit seeking damages on behalf of premium users who had their log-in passwords exposed as a result of a security breach of the company's servers last year.
Evernote is speeding up its plans to offer two-factor authentication to users following a recent data breach that exposed user names, email addresses and encrypted passwords.
Dylan Wheeler, a computer security and gaming enthusiast who lives near Perth in Western Australia, could very well be in a lot of trouble.
Zendesk said Thursday a hacker gained access to support information for some customers of its online help desk software.
Most Popular Reviews
- 1 Samsung's Galaxy Alpha review: A peek into the Galaxy S6
- 2 Lenovo Yoga 3 Pro hybrid Ultrabook
- 3 Bose SoundLink on-ear Bluetooth headphones
- 4 Apple iPhone 6 Plus: An in depth review
- 5 Medion Akoya P2214T (MD99430) hybrid laptop
Best Deals on GoodGearGuide
Latest News Articles
- Weather.com fixes web application vulnerabilities
- Early version of new POS malware family spotted
- Syrian Electronic Army posts hacking message on several news sites
- Fastest LTE speed will be out of reach for most users
- EU net neutrality discussions to continue into the next year
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCTech Support | IT Services Firm - Ad hoc Projects - Echuca AreaVIC
- FTProgram Manager - Integration & SolutionsNSW
- CCTech Support | IT Services Firm - Ad hoc Projects - Port Augusta / Whyalla AreaSA
- FTPartnership Manager - MediaNSW
- FTAccount ExecutiveNSW
- FTSEO Content ExecutiveVIC
- FTStudio Design ManagerVIC
- FTDigital Account ManagerNSW