The popular mobile messaging application WhatsApp Messenger has a major design flaw in its cryptographic implementation that could allow attackers to decrypt intercepted messages, according to a Dutch developer.
The U.S. National Security Agency has repeatedly tried to compromise Tor, the government-funded online anonymity tool, but has had little success, according to a new report in the U.K.'s Guardian.
Hackers broke into the internal computer network of Adobe Systems and stole information on 2.9 million customers, as well as source code for several of the company's products.
The U.S. National Security Agency's reported efforts to weaken encryption standards have prompted an encrypted communications company to move away from cryptographic algorithms sanctioned by the U.S. National Institute of Standards and Technology (NI...
The U.S. National Institute of Standards and Technology (NIST) has vigorously denied that the U.S. National Security Agency (NSA) tampered with NIST's process of vetting and choosing encryption algorithms.
The spike in the number of clients using the Tor anonymity network was likely caused by a botnet, according to Tor and third-party security researchers.
Silent Circle, a company specializing in encrypted communications, released a messaging application for Android devices on Wednesday that encrypts and securely erases messages and files.
The U.S. intelligence community is reportedly using a fifth of its US$52.6 billion annual budget to fund cryptography-related programs and operations.
The U.S. National Security Agency reportedly cracked the encryption used by the video teleconferencing system at the United Nations headquarters in New York City.
A portion of the North American user base of "League of Legends" (LoL) had its account information compromised by hackers, according to Riot Games, the company developing the popular online multiplayer game. Passwords and credit card numbers stored i...
Microsoft released two optional security updates Tuesday to block digital certificates that use the MD5 hashing algorithm and to improve the network-level authentication for the Remote Desktop Protocol.
Several Bitcoin wallet applications have been upgraded following a serious cryptography problem in Android that could allow attackers to steal the virtual currency.
Silent Circle also shuttered its encrypted email service a few hours after Lavabit shut down citing an ongoing legal battle.
Two security researchers at Defcon on Friday revealed the methods they used to hack into car computers and take over the steering, acceleration, brakes and other important functions.
Most Popular Reviews
- 1 Microsoft Surface Pro 3 Windows 8.1 tablet
- 2 Medion Akoya E4110 (MD 8239) desktop PC
- 3 Samsung Galaxy Tab S (10.5) 4G review
- 4 Dell Inspiron 11 3000 Series convertible laptop
- 5 Kogan Agora 4G review
Best Deals on GoodGearGuide
Latest News Articles
- IBM Watson cooks up some new dishes
- Apple will keep pushing for a sales ban on Samsung products
- Facebook testing mobile searches for old posts
- Appeals court denies Oracle request to restore $1.3 billion judgment against SAP
- Boston's Bolt launches hardware companies
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.