Many open-source software developers need to improve the way in which they handle vulnerability reports, according to researchers from security firm Rapid7, who recently found and reported vulnerabilities in seven popular open-source software applica...
Mozilla is working on a geolocation data service using cell tower and Wi-Fi signals to give developers what it says will be a more privacy-aware option than current alternatives.
About 4,500 people have indicated they plan to attend a rally Saturday in Washington, D.C., to protest surveillance programs run by the U.S. National Security Agency.
U.S. President Barack Obama should add actual technologists to a group reviewing the nation's surveillance technologies, IT-related groups have said.
The U.S. National Security Agency has repeatedly tried to compromise Tor, the government-funded online anonymity tool, but has had little success, according to a new report in the U.K.'s Guardian.
A vulnerability found recently in an OpenID-based feature of the Mozilla Persona online identity management service prompted the company to advise Web developers to check their OpenID implementations for similar issues.
The U.S. Congress must act quickly on legislation that would make electronic data collection efforts by the U.S. National Security Agency more public, a group of tech firms, civil liberties groups and other organizations said Monday.
Although the number of malicious browser extensions has significantly increased in the past year many security products fail to offer adequate protection against them, while others are simply not designed to do so, according to a security researcher.
Plug-ins based on the NPAPI architecture will be blocked by default in Chrome starting early next year as Google moves toward completely removing support for them in the browser.
The Firefox OS, a new contender in mobile operating systems, will likely see HTML5-related attacks and assaults on a crucial operating system process, according to security vendor Trend Micro.
Mozilla is considering the possibility of rejecting as invalid SSL certificates issued after July 1, 2012, with a validity period of more than 60 months. Google already made the decision to block such certificates in Chrome starting early next year.
Mozilla is developing a protocol that aims to let security tools and Web browsers work better together.
Mozilla and Google have updated their browsers with features to help developers more effectively write and debug their websites.
Trend Micro has found two malicious browser extensions that hijack Twitter, Facebook and Google+ accounts.
The latest simulator for the upcoming Firefox mobile OS is aimed to please developers planning to sell applications.
Latest News Articles
- Tata revenue, profit up on strong outsourcing demand
- German researchers hack Galaxy S5 fingerprint login
- Telefónica starts exchange for targeted mobile ads
- Glass all gone after one-day sale, Google says
- Mt. Gox has filed for liquidation in Japan, says report
Most Popular Articles
- 1 What's the difference between an Intel Core i3, i5 and i7?
- 2 Windows 7 Home Premium vs. Windows 7 Professional
- 3 Laser vs. inkjet printers: which is better?
- 4 How do I connect my TV to the Internet?
- 5 How to play DVD movies on your Nintendo Wii
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.