Apple says it has a fix in the works for the Mac Defender fake antivirus app that has plagued a surprising number of Mac users in recent weeks. The company recently posted a Mac Defender support page explaining how you can remove the malware from you...
Hotmail accounts were recently targeted by an attacking against a zero-day vulnerability in the Microsoft Webmail system. The attack is more insidious than some because it executes without user intervention when a malicious email is opened.
I didn't expect to get a ticket to the rapture, but judging from the lack of abandoned vehicles it seems that the rumors of the end of the world were a bit exaggerated. However, even though the world did not come crashing to a halt today, don't let ...
Mac Defender is turning out to be somewhat of an epidemic that neither Apple, nor Mac users seem prepared for. The Mac malware has caught the Apple ecosystem off guard and threatens to shatter the reality distortion field that Apple thrives on.
Mac users don't have to worry about malware, right? Well, for many years that's been true, although the reasons were always the topic of contentious debate between the Apple faithful and various security researchers, many of whom predicted Mac securi...
Israel is setting up a national task force to expand the state's ability to defend vital infrastructure networks from cyberterrorist attacks by foreign countries and terrorist elements, according to a <a href="http://www.pmo.gov.il/PMOEng/Communicati...
There are phishing scams out there targeting Adobe users. Make sure you know how to recognize and avoid these threats when they arrive in your Inbox.
Security researchers revealed a dangerous exploit in Skype for Mac which can be exploited to create a worm that can take control of Mac PCs. This FAQ will help you understand the potential impact of the threat, and what you can do to protect your sys...
Attackers are now using Google's image search to distributed malware, security experts say. Thousands of sites have reportedly been compromised by code injection -- the malicious code redirects users to fake antivirus applications.
The death of Osama bin Laden, the dramatic events surrounding the military operation against bin Laden's compound in a posh Pakistani suburb, and the resulting conspiracy theories and fear of retaliatory attacks from Al Qaeda are all very popular top...
Malware creators are already using the news of Osama Bin Laden's death as a opportunity to try and dupe people into clicking on malicious links. According to cloud-security firm Zscaler, researchers were already seeing malicious sites emerge to capit...
The Pakistani programmer who dubbed himself "the guy who liveblogged the Osama raid without knowing about it" is also the guy who got his website hacked without knowing about it.
The announcement late Sunday of the death of al-Qaeda leader Osama bin Laden has set the Internet abuzz, as users searched for information and shared their thoughts on the killing of one of the world's most wanted men.
Iran claims to have discovered new malware it is calling the Stars worm attacking the nation's critical infrastructure. But, the lack of any sample of the new threat make many security experts skeptical.
While a company can do everything possible for its own network security, in the age of e-commerce and online banking that's not enough.
Most Popular Reviews
- 1 HP Stream 11 laptop
- 2 Acer Chromebook 11 (CB3-111)
- 3 Asus Zenbook UX303LN Ultrabook
- 4 Samsung's Galaxy Alpha review: A peek into the Galaxy S6
- 5 Lenovo Yoga 3 Pro hybrid Ultrabook
Best Deals on GoodGearGuide
Latest News Articles
- North Korea wants joint probe into Sony hack, warns of consequences if not
- Staples says hack may have compromised 1 million-plus payment cards
- Judge questions evidence on whether NSA spying is too broad
- Three ways enterprise software is changing
- T-Mobile to pay $90M for unauthorized charges on customers' bills
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.