The Wall Street Journal said Thursday it had been targeted by hackers trying to monitor the newspaper's coverage of China, less than a day after a similar revelation from its competitor The New York Times.
Hackers from China breached the computer network of The New York Times and stole passwords that allowed them to gain access to computers and email accounts for a period of four months, the newspaper reported late Wednesday.
Google thinks it might have found an answer to the vexing problem of forgotten or weak passwords: "physical" passwords, which might come in the form of a piece of jewelry such as a ring.
European Commission proposals for a strategy on cybercrime have come under fire before they have even been released.
Unidentified attackers stole sensitive information from hundreds of diplomatic, government, research and military organizations from around the world as part of a newly uncovered cyberespionage campaign that started nearly six years ago. The operatio...
Japan's space agency said Friday that sensitive information on a new long-range rocket project may have been stolen by a computer virus.
A group of hackers leaked email contact information of experts working with the International Atomic Energy Agency (IAEA) after breaking into one of the agency's servers.
Romanian law enforcement authorities have dismantled a criminal group that stole credit card data from foreign companies as part of an operation that resulted in fraudulent transactions totaling US$25 million.
South Carolina's governor faulted an outdated Internal Revenue Service standard as a contributing factor to a massive data breach that exposed Social Security numbers of 3.8 million taxpayers plus credit card and bank account data.
Adobe has shut down Connectusers.com, a community forum site for users of its Adobe Connect Web conferencing platform, because the site's user database was compromised.
Adobe said Wednesday it is investigating the release of 230 names, email addresses and encrypted passwords claimed to have been stolen from a company database.
The recent cyberattack that infected Israeli police computers with malware was likely part of a year-long cyberespionage operation with targets in Israel and the Palestinian territories, according to security researchers from antivirus vendor Norman.
Members and followers of the Anonymous hacking group demonstrated outside the British Parliament in London Monday, following a series of hacking attacks to protest, among other things, the incarceration or confinement of alleged hackers and various p...
In one of the photos, the dark-haired, bearded hacker is peering into his computer's screen, perhaps puzzled at what's happening. Minutes later, he cuts his computer's connection, realizing he has been discovered.
Most Popular Reviews
- 1 Bose SoundLink on-ear Bluetooth headphones
- 2 Apple iPhone 6 Plus: An in depth review
- 3 Medion Akoya P2214T (MD99430) hybrid laptop
- 4 Motorola Moto G (2nd Gen.) android smartphone
- 5 HTC One Mini 2 android smartphone
Best Deals on GoodGearGuide
Latest News Articles
- Microsoft to continue using Nokia brand on entry-level phones
- Apple iPad Air 2: The immeasurable difference made by 1mm
- Adobe begins encrypting user data collected from Digital Editions app
- St George turns on fingerprint login for Apple iOS Internet banking
- Acer leads growth in PC shipments
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTDigital PR SpecialistNSW
- FTTechnical Marketing ManagerNSW
- FTMarketing Communications Operations Manager - Global Tech Market leaderNSW
- FTPartner Marketing Communications Manager - Leading Global Tech BrandNSW
- FTAccount ExecutiveNSW
- FTBusiness development manager - retargettingNSW
- CCConsumer Product Marketing ManagerNSW
- FTBusiness ManagerNSW
- FTDigital Account ExecutiveNSW