One of the biggest security threats out there doesn't come from malicious hackers or online identity thieves. It actually comes from you, the innocent PC user and your out-of-date software. But you can put an end to that threat with the free Secunia ...
Facebook straddles a precarious line when it comes to information security and data privacy. As a social networking site, its very existence is based on the premise of freely sharing information -- status updates, photos, likes, location check-ins --...
Half of U.S. government Web sites are vulnerable to commonplace DNS attacks because they haven't deployed a new authentication mechanism that was mandated in 2008, a new study shows.
These days, no popular movement goes without an Internet presence of some kind, whether it's organizing on Facebook or spreading the word through Twitter. And as we've seen in Egypt, that means that your Internet connection can be the first to go. Wh...
Police agencies worldwide are turning up the heat on a loosely organized group of WikiLeaks activists. On Thursday U.K. police arrested five people, and U.S. authorities said they'd executed more than 40 search warrants in the U.S. in connection with...
The Stuxnet worm attack known to have struck computers at the Russian-built Iranian Bushehr nuclear plant in Iran has serious implications and could have caused "another Chernobyl," a Russian ambassador is said to have advised NATO yesterday, accordi...
After hitting an all-time high in the third quarter of 2010, click fraud incidence dropped last quarter, although the practice still rendered almost one in five cost-per-click (CPC) ads useless for the marketers that paid for them.
The operator of an alleged "scareware" scheme, using deceptive advertising to trick Internet users into buying software to fix their supposedly infected computers, will pay the U.S. Federal Trade Commission US$8.2 million to settle a complaint brough...
A new report from Akamai Technologies shows that hackers appear to be increasingly using the Telnet remote access protocol to attack corporate servers over mobile networks.
The U.S. government has been stepping up its use of smart cards to help lock down its computer networks, but hackers have found ways around them.
If you haven't bought a new version of your antivirus software in a couple of years, now may be a good time to do so. Malware is evolving faster than ever, and the latest generation of antivirus software is better equipped to handle this rapid pace o...
Researchers have found a cheaper, faster way to process SSL/TLS with off-the-shelf hardware, a development that could let more Web sites shut down cyber threats posed by the likes of the Firesheep hijacking tool.
Security start-up CloudPassage is offering two free services to protect cloud-based virtual servers by maintaining firewall policies and also checking for software vulnerabilities.
The U.S. needs consistent rules for how law enforcement agencies can access the ever-growing collection of location-based data from mobile devices, a U.S. senator said Wednesday.
Facebook founder Mark Zuckerberg appears to be the second high-profile victim of a hacking attack on his own Facebook page, following a similar account takeover early this week targeting French president Nicolas Sarkozy.
Most Popular Reviews
- 1 HTC One Mini 2 android smartphone
- 2 Microsoft Surface Pro 3 Windows 8.1 tablet
- 3 Medion Akoya E4110 (MD 8239) desktop PC
- 4 Samsung Galaxy Tab S (10.5) 4G review
- 5 Dell Inspiron 11 3000 Series convertible laptop
Best Deals on GoodGearGuide
Latest News Articles
- IEEE standards group wants to bring order to IoT
- InfiniDB going out of business, but its database will live on as open source
- FCC questions how to enforce net neutrality rules
- SAP CEO Bill McDermott on why Concur is worth $8.3 billion
- Alibaba shares open at a high $92.70
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.