It's generally accepted that antivirus programs provide a necessary protection layer, but organizations should audit such products before deploying them on their systems because many of them contain serious vulnerabilities, a researcher warned.
Eastern European-based attackers gained access to the networks of energy providers by tampering with software updates for industrial control systems, gaining a foothold that could be used for sabotage, Symantec said Monday.
A malware threat previously used in attacks against energy sector companies is now being aimed at organizations that use or develop industrial applications and machines.
Users can test by simply visiting a Web page if their computers have been infected with Gameover Zeus, a sophisticated online banking Trojan that law enforcement officers temporarily disrupted last week.
A new variant of the Gameover computer Trojan is targeting job seekers and recruiters by attempting to steal log-in credentials for Monster.com and CareerBuilder.com accounts.
The creators of a Web-based attack tool called Angler Exploit Kit have added an exploit for a known vulnerability in Microsoft's Silverlight browser plug-in to the tool's arsenal.
Trend Micro has found two malicious browser extensions that hijack Twitter, Facebook and Google+ accounts.
A new piece of digitally signed spyware for Mac OS X uses a special Unicode character in its file name to hide its real file extension from users and trick them into installing it.
Twitter's SMS-based, two-factor authentication feature could be abused to lock users who don't have it enabled out of their accounts if attackers gain access to their log-in credentials, according to researchers from Finnish antivirus vendor F-Secure...
Security researchers have identified multiple samples of the recently discovered "KitM" spyware for Mac OS X, including one dating back to December 2012 and targeting German-speaking users.
Previously unknown Mac OS X spyware, signed with a valid Apple Developer ID, has turned up on the laptop of an activist from Angola at a human rights conference in Norway.
The Android threat landscape is growing in both size and complexity with cybercriminals adopting new distribution methods and building Android-focused malware services, according to a report from Finnish security vendor F-Secure.
A recently patched Java remote code execution vulnerability is already being exploited by cybercriminals in mass attacks to infect computers with scareware, security researchers warn.
Recent reports from antivirus companies seem to suggest that the number of Android malware threats is growing. However, there are still many skeptics who think that the extent of the problem is exaggerated.
The administrators of a popular iOS developer Web forum called iPhoneDevSDK confirmed Wednesday that it had been compromised by hackers who used it to launch attacks against its users. Security experts believe the site served as a gateway for the rec...
Most Popular Reviews
- 1 Medion Akoya E4110 (MD 8239) desktop PC
- 2 Samsung Galaxy Tab S (10.5) 4G review
- 3 Kogan Agora 4G review
- 4 Motorola Moto E review
- 5 OnePlus One: An Australian review
Best Deals on GoodGearGuide
Latest News Articles
- Report: Amazon building ad system to compete with Google's
- Airbnb to reveal 124 New York hosts to attorney general
- US warns 'significant number' of major businesses hit by Backoff malware
- HP loses its leader on NFV, a key carrier network trend
- Google acquires Gecko Design for next-generation products
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTChief Information OfficerNSW
- FTMachine Learning | JAVA | San Fran based global Company | SydneyNSW
- FTAccount Manager Programmatic Trading DeskNSW
- FTInformation Services ManagerNZ
- FTMarketing Communications Executive - B2BNSW
- FTSearch Account ManagerNSW
- CCL2 Technical Support Engineer - RightFax/MessagingVIC