Despite the significant Java security improvements made by Oracle during the past six months, Java vulnerabilities continue to represent a major security risk for organizations because most of them have outdated versions of the software installed on ...
More fixes are appearing for a pair of highly dangerous vulnerabilities exposed earlier this month in the Android mobile operating system.
A new piece of digitally signed spyware for Mac OS X uses a special Unicode character in its file name to hide its real file extension from users and trick them into installing it.
Several underground marketplaces are offering full information packages for sale that contain verified health insurance credentials, bank account numbers, Social Security numbers and other personal information, along with counterfeit physical documen...
Trend Micro says it detected a targeted attack that sent malware-laden emails to representatives of 16 European countries and some Asian governments.
A new version of a file-infecting malware program that's being distributed through drive-by download attacks is also capable of stealing FTP (File Transfer Protocol) credentials, according to security researchers from antivirus firm Trend Micro.
A second vulnerability that can be exploited to modify legitimate Android apps without breaking their digital signatures has been identified and publicly documented.
Paying rewards to independent security researchers for finding software problems is a vastly better investment than hiring employees to do the same work, according to researchers from the University of California Berkeley.
Of the six critical security bulletins Microsoft issued in its Patch Tuesday monthly release of software updates, three address a vulnerability in how Microsoft software renders fonts.
Technical details and a proof-of-concept exploit have been published for a recently announced Android vulnerability that potentially affects millions of devices and allows attackers to turn legitimate apps into Trojan programs.
A noisy malware campaign against South Korea is revealing deeper secrets.
China saw an increase in Trojan and botnet attacks coming from other countries in 2012, as the amount of mobile malware in the country also surged, according to a local security group.
A persistent, widespread malware campaign that utilizes compromised Apache servers is locking users' computers and demanding a fee of US$300 to free their data.
A vulnerability that has existed in Android for the past four years can allow hackers to modify any legitimate and digitally signed application in order to transform it into a Trojan program that can be used to steal data or take control of the OS.
A simple piece of malicious software is circulating that steals Litecoins, a virtual currency based on the Bitcoin system.
Most Popular Reviews
- 1 Bose SoundLink on-ear Bluetooth headphones
- 2 Apple iPhone 6 Plus: An in depth review
- 3 Medion Akoya P2214T (MD99430) hybrid laptop
- 4 Motorola Moto G (2nd Gen.) android smartphone
- 5 HTC One Mini 2 android smartphone
Best Deals on GoodGearGuide
Latest News Articles
- Wi-Fi Passpoint standard now knits together SF, San Jose, London
- Big Data Digest: Rise of the think-bots
- FCC pushes TV spectrum auction to 2016 after legal challenge
- Apple mum as Mac owners tussle with Yosemite over Wi-Fi problems
- Apple Pay tops Tim Cook's to-do list in China
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTAccount ExecutiveNSW
- FTDigital PR SpecialistNSW
- CCConsumer Product Marketing ManagerNSW
- FTBusiness ManagerNSW
- FTBusiness development manager - retargettingNSW
- FTPartner Marketing Communications Manager - Leading Global Tech BrandNSW
- FTTechnical Marketing ManagerNSW
- FTDigital Account ExecutiveNSW
- FTMarketing Communications Operations Manager - Global Tech Market leaderNSW