The group claiming responsibility for the Sony Pictures hack has denied it threatened Sony employees and demanded the studio halt the release of a movie that makes light of an assassination attempt on the leader of North Korea.
Webmasters who patched their sites against a serious SSL flaw discovered in October will have to check them again. Researchers have discovered that the vulnerability also affects implementations of the newer TLS (Transport Layer Security) protocol.
A surveillance law that was rushed through by the U.K. government will be reviewed by the country's High Court to determine if it violates human rights.
Many gamers couldn't access Sony's PlayStation Network (PSN) for hours on Sunday evening after an apparent attack against the service. The PlayStation Store was also reportedly affected.
Vodafone UK isn't letting its customers access the website of the Chaos Computer Club (CCC), one of the oldest and largest associations of computer hackers in Europe.
North Korea's government has denied any involvement in the attack on Sony Pictures, but in a Sunday statement indicated that it's not necessarily unhappy that it happened.
The NSA has conducted a covert campaign to intercept internal communications of operators and trade groups in order to infiltrate mobile networks worldwide, according to the latest revelations from documents supplied by Edward Snowden.
The hack against Sony Pictures appeared to enter new territory on Friday when employees reportedly received messages threatening them and their families.
Blowing up entrenched business models and picking up the profits that spill onto the floor is a time-honored tradition in tech, these days known by the cliche of the moment, "disruption." Here are our picks for the top stories of a very, well, disru...
Women's clothing retailer Bebe Stores has become the latest national retailer to be hit by an attack on its credit card payment system.
Internet mass surveillance programs are lawful and do not violate human rights, a U.K. tribunal has ruled.
A malware program with data wiping functionality that was recently used to attack Sony Pictures Entertainment bears technical similarities to destructive malware that affected organizations in South Korea and the Middle East in the past.
Smartphones from Apple, Xiaomi and others have been violating Taiwan's privacy laws by collecting user data and sending it back to company servers, according to a government regulator.
U.S. Senator Ron Wyden on Thursday introduced a bill that would prevent the government from forcing companies to design backdoors or security vulnerabilities into their products to aid surveillance.
IBM's X Force security researchers found an easy way to gain access to Web accounts by taking an advantage of an oversight in how some social login services are configured.
Most Popular Reviews
- 1 HP Stream 11 laptop
- 2 B&O BeoPlay A2 portable Bluetooth speaker
- 3 Acer Chromebook 11 (CB3-111)
- 4 Asus Zenbook UX303LN Ultrabook
- 5 Samsung's Galaxy Alpha review: A peek into the Galaxy S6
Best Deals on GoodGearGuide
Latest News Articles
- MIT unifies Web development in a single, speedy new language
- Google, Microsoft, Sony make 'The Interview' available online
- Experts: FCC will adopt net neutrality rules in early 2015
- Romanian version of EU cybersecurity directive allows warrantless access to data
- Rackspace DNS recovers after DDoS brings system down
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.