Just hours before Adobe is slated to deliver the latest patches for its popular PDF viewer, a security firm announced that by its counting, malicious Reader documents made up 80% of all exploits at the end of 2009.
Imagine a scenario in which a downloadable application turns smartphones into network-clogging bots, causing U.S. mobile-phone networks to fail, and eventually spreads to the wired Internet.
The security measures at Royal Dutch Shell are under close scrutiny after the details of 176,000 employees and contractors were emailed to campaigners.
Just weeks after patching a critical flaw, Adobe Systems is rushing out another patch for its Reader and Acrobat software. The company also patched a critical issue in Flash Player Thursday.
A former security researcher turned criminal hacker has been sentenced to 13 years in federal prison for hacking into financial institutions and stealing credit card account numbers.
A popular Twitter application used to measure the influence of Twitter users has been hacked and used to send spam messages.
Former US military security specialist Christopher Tarnovsky has found a weakness in Infineon's SLE66 CL PE.
The Australian Parliament's Web site was hit by an apparent denial-of-service attack Wednesday, two days after the hacking group Anonymous threatened attacks over the government's plan to filter Web content.
In a live demonstration Wednesday at the Black Hat DC conference, a security consultant showed how it's possible to exploit a flaw in the Microsoft Internet Explorer browser to remotely read files on the victim's local drive, prompting a security adv...
Public Wi-Fi networks such as those in coffee shops and airports present a bigger security threat than ever to computer users because attackers can intercede over wireless to "poison" users' browser caches in order to present fake Web pages or even s...
The successor program to the notorious Zango spyware Toolbar is being used to target users of Mozilla's Firefox with fake browser updates, a security company has alleged.
An analysis of real-world online behaviour has warned of the unsettling phenomenon that led to this week's high-profile Twitter login scare. Far too many people re-use the same logins for more than one site.
A clever phishing scheme launched last week may have stolen more than €3 million (US$4.1 million) worth of carbon emission permits from companies.
A look back at previous Black Hat conferences reveals why it's such a big draw – presenters continue to deliver briefings that shock, amaze and amuse. See how well you remember some notorious incidents by taking this quiz. Keep track of your score an...
Twitter required some users to reset their passwords on Tuesday after discovering that their log-in information may have been harvested via security-compromised torrent Web sites, the company said.
Latest News Articles
- LTE to make spectrum-rich richer in 2014: Analysys Mason
- Guide: Last-minute Christmas gifts
- Toyota to bring fuel-cell concept car to CES
- Frustrated users complain about SkyDrive problems after Windows 8.1 update
- Intel signs tech partnership for 49ers' Silicon Valley stadium
Most Popular Articles
- 1 What's the difference between an Intel Core i3, i5 and i7?
- 2 Laser vs. inkjet printers: which is better?
- 3 Windows 7 Home Premium vs. Windows 7 Professional
- 4 How do I connect my TV to the Internet?
- 5 Samsung’s 2013 Smart TVs: everything you need to know
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
Best Deals on GoodGearGuide
Best Deals on PCWorld
- TabletsView all »
- NotebooksView all »
- Mobile PhonesView all »
- Printers & ScannersView all »
- Networking, Wireless & VoIPView all »