Ruby on Rails users are advised to upgrade to newly released versions of the Web development framework that contain important security fixes, according to the Rails development team.
A security researcher has released software and technical instructions for modifying a drone so that it can identify and hijack other drones.
Two million logins and passwords from services such as Facebook, Google and Twitter have been found on a Netherlands-based server, part of a large botnet using controller software nicknamed "Pony."
North Korea is likely to escalate its cyberattacks on South Korea in the coming years in an effort to convince its southern neighbor to back off demands to limit its nuclear program, a Korea expert predicted.
In a development likely to concern those who believe that a system that's not connected to a network is safe from surveillance, researchers have demonstrated that microphones and speakers built into laptops can be used to covertly transmit and receiv...
Here are 10 types of links you should never click on.
A man from Wisconsin was sentenced for participating in a DDoS (distributed denial-of-service) attack by hacker group Anonymous on a Kansas company.
D-Link published patches on Monday for a firmware coding goof that could allow attackers to remotely change the settings of several of its router models.
A wide variety of government officials could gain access to live data concerning users of ISPs and online services including content-hosting sites, without the approval of a judge, under a draft law approved by members of the French National Assembly...
Content delivery services provider Akamai Technologies plans to buy Prolexic Technologies, a distributed denial-of-service (DDoS) mitigation specialist, for US$370 million in cash.
A popular Bitcoin discussion forum warned on Monday some user passwords may have been intercepted after the site's DNS (Domain Name System) registrar was breached.
Attackers could force phones from Google's Nexus line to reboot or fail to connect to the mobile Internet service by sending a large number of special SMS messages to them.
Attackers are exploiting a new and unpatched vulnerability in Windows XP and Windows Server 2003 that allows them to execute code with higher privileges than they have access to.
Google's practice of combining personal data from different Google services violates the Dutch data protection act, the Dutch data protection authority (DPA) said Thursday. But Google will not face any enforcement actions for now.
A new worm is targeting x86 computers running Linux and PHP, and variants may also pose a threat to devices such as home routers and set-top boxes based on other chip architectures.
Latest News Articles
- On snooping disclosures, AT&T and Internet companies are like night and day
- Yahoo buys concert live-streaming startup Evntlive
- Wall Street Beat: Tech stocks hit 13-year high
- DARPA makes finding software vulnerabilities fun
- Mobile chip speed wars have to end, Broadcom chairman says
Most Popular Articles
- 1 What's the difference between an Intel Core i3, i5 and i7?
- 2 Laser vs. inkjet printers: which is better?
- 3 How do I connect my TV to the Internet?
- 4 Windows 7 Home Premium vs. Windows 7 Professional
- 5 Samsung’s 2013 Smart TVs: everything you need to know
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
Best Deals on GoodGearGuide
Best Deals on PCWorld
- TabletsView all »
- NotebooksView all »
- Mobile PhonesView all »
- Printers & ScannersView all »
- Networking, Wireless & VoIPView all »