The U.S. House of Representatives moved closer Wednesday toward the passage of the Cyber Intelligence Sharing and Protection Act (CISPA), despite concerns that the cyberthreat information-sharing bill will allow Web-based companies to share a wide am...
The chief sponsor of the Cyber Intelligence Sharing and Protection Act (CISPA) in the U.S. Congress has ignited a Twitter storm by suggesting many opponents of the proposed cyberthreat sharing bill are 14-year-olds in basements.
The White House has threatened to veto the controversial Cyber Intelligence Sharing and Protection Act (CISPA) in its present form, citing concerns that the bill does not adequately prevent sharing of irrelevant personal information.
Pirate Bay co-founder Gottfrid Svartholm Warg was charged with hacking the IBM mainframe of Logica, a Swedish IT firm that provided tax services to the Swedish government, and the IBM mainframe of the Swedish Nordea bank, according to the Swedish pub...
Paying for an app in Google's online store, Google Play, will banish nagging in-app ads, but it won't dam the flow of personal information from your phone to marketers.
The Cyber Intelligence Sharing and Protection Act (CISPA), a controversial cyberthreat information-sharing bill, will be debated on the floor of the U.S. House of Representatives this week, despite continued opposition from some privacy and digital r...
Find My Mac can be used to show the location of a stolen Mac, but the service often does not provide enough evidence to obtain a search warrant and get the stolen device back to its rightful owner, the Dutch police said on Monday.
A U.S. House of Representatives committee failed to make the changes necessary to allay fears about government surveillance in a controversial cyberthreat sharing bill that's moving toward a House vote, critics said.
A feature in the Twitter API (application programming interface) can be abused by attackers to launch credible social engineering attacks that would give them a high chance of hijacking user accounts, a mobile application developer revealed Wednesday...
Hackers could use vulnerable charging stations to prevent the charging of electric vehicles in a certain area, or possibly even use the vulnerabilities to cripple parts of the electricity grid, a security researcher said during the Hack in the Box co...
“Improving users' experience” is not justification for using consumer information in Big Data projects according to Europe's top data protection officials.
The high-end Canon EOS-1D X camera can be hacked for use as a remote surveillance tool, with images remotely downloaded, erased and uploaded, a researcher said during the Hack in the Box security conference in Amsterdam on Wednesday.
Mobile phone apps are accessing users' private data and transmitting it to remote servers far more than appears strictly necessary, while users have inadequate tools to monitor or control such access, according to a new study by two French government...
Last week, Facebook released new software for Android phones called "Home." The software is a set of apps that you can download to put Facebook photos and messaging front and center on your mobile device.
Social network's new overlay for Android smartphones 'would be the first thing I would block on my network,' said one security adviser
Most Popular Reviews
- 1 Medion Akoya E4110 (MD 8239) desktop PC
- 2 Samsung Galaxy Tab S (10.5) 4G review
- 3 Kogan Agora 4G review
- 4 Motorola Moto E review
- 5 OnePlus One: An Australian review
Best Deals on GoodGearGuide
Latest News Articles
- Report: Amazon building ad system to compete with Google's
- Airbnb to reveal 124 New York hosts to attorney general
- US warns 'significant number' of major businesses hit by Backoff malware
- HP loses its leader on NFV, a key carrier network trend
- Google acquires Gecko Design for next-generation products
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTMachine Learning | JAVA | San Fran based global Company | SydneyNSW
- FTChief Information OfficerNSW
- FTAccount Manager Programmatic Trading DeskNSW
- FTInformation Services ManagerNZ
- FTSearch Account ManagerNSW
- FTMarketing Communications Executive - B2BNSW
- CCL2 Technical Support Engineer - RightFax/MessagingVIC