restrict settings
additional restrictions: Security
UK Parliament was forced to restrict access to their email accounts due to sustained cyber-attacks today. (Source: Justin Tallis/AFP/Getty Images)

UK parliament suffering from sustained cyber-attacks

Parliament's email system has been forced to close itself off from outside connections following a series of persistent cyber-attacks discovered today.
Google's latest announcement will bring a feature users of G Suite have come to expect to Gmail for everyone. (Source: Gmail)

Google says it will stop Gmail's scanning of email to target ads

In a recent post to the company blog, Google announced its plans to "more closely align" the free version of Gmail and the enterprise version found in subscription-based G Suite. This includes removing ad personalization based on the contents of your emails.
The iMac Pro was introduced at WWDC in early June but will not be available until December. (Source: Associated Press)

iMac Pro may pack both server-grade Xeon and ARM CPUs

An enthusiast rummaging through firmware files for macOS High Sierra found information suggesting that the upcoming iMac Pro will be powered by server-grade Xeon processors and protected by an ARM chip known as a Security Enclave Processor. The existence of an ARM chip the same as those found in the MacBook Pro with TouchBar sparks speculation that the iMac ...
Source: Debian

Debian 9 "Stretch" now available

The update brings enhanced security features, more accessible debug tools, and updates to over 51,000 software packages throughout the Debian repositories.
Google looks to take a harder stance against policy violators and online terrorists. (Source: Google)

Google takes a hard line on online terror in its new 4-step plan

In a recent blog post, General Counsel at Google Ken Walker delineated the company's mission to combat terrorism online. While Google already devotes a portion of its enormous resources toward counter-terrorism, the company aims to bolster its efforts with a newly published 4-step plan.
WannaCry is estimated to have extracted US$126,000 in Bitcoin from victims. (Source: Gillian Hann/Twitter)

British intelligence claims North Korea is behind WannaCry, though doubts persist

US and British intelligence services believe that they tracked the WannaCry ransomware to North Korea via attributing it to the Lazarus Group, who hacked Sony Pictures in 2014 preceding the release of the comedy film "The Interview".
The Vivo's optical fingerprint reader was shown in a leaked video. (Source: WeiBo)

New phone from Vivo may feature a fingerprint reader embedded under the screen

A new phone from Vivo appearing in a leaked video was shown to be unlocked by fingerprint through a sensor embedded within the screen on the device. Rumors suggest that this type of sensor might be appearing in new smartphones soon.
Fujitsu Lifebook T937 (i7, 512 GB) Convertible Review

85% Fujitsu Lifebook T937 (i7, 512 GB) Convertible Review

Turned on its head. A business notebook with an all-around worry-free package - already noticeable from opening the box. But the abundant accessories cannot hide the weaknesses.
Intel Core i7-7600U | Intel HD Graphics 620 | 13.3" | 1.4 kg
Google Drive becomes Google Backup and Sync and will release on June 28th. (Source: Google)

Google Drive will become Google Backup and Sync, will be able to back up more files

Google Drive will soon become Google Backup and Sync, which will start backing up your selected files not just from your Google Drive folder, but from almost anywhere on your computer.
Lenovo ThinkPad T470p (Core i7, GeForce 940MX) Laptop Review

88% Lenovo ThinkPad T470p (Core i7, GeForce 940MX) Laptop Review

Ample performance! Lenovo plants a very strong CPU combined with a dedicated GPU into a 14-inch business laptop. This combination, which Lenovo already presented last year, is slightly unusual. You can find out in our detailed review whether the weaknesses of the predecessor were reduced or completely removed.
Intel Core i7-7700HQ | NVIDIA GeForce 940MX | 14" | 1.9 kg
HP Elite x3 Phablet (incl. Lap Dock) Review

86% HP Elite x3 Phablet (incl. Lap Dock) Review

Business racer. HP is the only manufacturer offering a premium device with Windows 10 Mobile, which is mainly targeted towards business customers. Besides a large display, the customer also receives a strong battery, and a robust case, which can even run x86 programs with HP Workspace.
Qualcomm Snapdragon 820 MSM8996 | Qualcomm Adreno 530 | 5.96" | 195 g
Apple is on-track to open 40 Apple retail stores in China by this October. (Source: TechCrunch)

Chinese officials uncover massive data theft by local Apple employees

An underground identity-theft ring where Apple employees were selling customers' personal data was uncovered in China.
The Malware, developed by a Chinese digital marketing company, hijacks the victim's browser and can then steal their private information or install additional malware. (Source: Check Point Threat Intelligence)

Chinese "Fireball" malware infects almost 250 million computers

Chinese company Rafotech has been found to be responsible for the current epidemic of the "Fireball" malware, which has affected nearly 250 million computers worldwide. Fireball is usually installed by piggybacking on an installer of wanted software; it then hijacks the user's browser and can then proceed to do anything from spying to dropping additional mal...
Intel and Microsoft moving forward with always-on eSIM PCs

Intel and Microsoft moving forward with always-on eSIM PCs

Notebook PCs will soon have WWAN/LTE capabilities without requiring external SIM cards or special modems.
The Compute Card is meant for a different audience than the consumer-oriented Compute Stick. (Source: Intel)

COMPUTEX 2017 | Intel's credit card-sized PC fully detailed

Intel has revealed more details on the Compute Card this Computex. The Card will be available in four SKUs and will begin shipping in August. Pricing is not confirmed.
A recently confirmed Android exploit can seize control of your device. (Image source:

"Cloak and Dagger" vulnerability can leave your Android phone open to attack

The exploit, which has long been theorized, was confirmed by computer security researchers. By using invisible overlays and some clever social engineering, hackers can quickly gain full control to an Android device.
The unassuming intrusion method has made this attack one of the most widespread in recent history. (Source: Check Point)

Vulnerability found in subtitle system of VLC, Kodi, and other media players

By injection malicious code into subtitle files, hackers are able to take full control of a device that loads the malicious subtitles. The exploit affects four of the biggest media streaming services: VLC, Kodi, Popcorn Time, and
Say goodbye to Messenger "Days", games, and poor performance by using Messenger Lite. (Source: Facebook)

If you're tired of Facebook Messenger's bloat, try Messenger Lite

Facebook's ubiquitous chatting app, Messenger, has become so bloated that Facebook has already spun off a version for developing markets called "Messenger Lite". To install it in most countries, however, you'll have to sideload it on your Android phone.
One metric for assessing the validity of a threat is its specificity. (Source: The Guardian)

Leaked internal Facebook censorship guidelines fuels concern about ethics

Internal documents from Facebook revealed to the Guardian show the difficulties the company is facing to police its 2-billion-strong membership.
Amazon Echo Dot Review

Amazon Echo Dot Review

Big ears. With the Amazon Dot, we are looking at the smaller of the two speakers from the US-based retail giant. While the assistant Alexa was very convincing in the test, the power consumption and data security provided reasons for criticism.
unknown | unknown | | 163 g
The Surface Laptop keeps the Surface aesthetic, but ditches the traditional Windows 10 OS. (Source: Twitter User @h0x0d)

Microsoft's new "Surface Laptop" reveals how seriously the company takes Chromebooks as a threat

Images and information leak about the Microsoft's latest piece of hardware, the Surface Laptop. The Laptop is designed to combat the rising popularity of Chromebooks in education and business by running a lighter, more secure cloud-based OS called Windows 10 S.
The Meizu PRO 5 was the last officially supported Ubuntu Touch phone. (Image Source: Ubuntu Insights)

Ubuntu Phone support will end in June, app store will close in December

The mobile OS will no longer be updated after June of this year, while the Ubuntu Touch app store will be closed by the end of the year. These moves will essentially kill off Ubuntu Touch.
In 2015, it was cited as the means by which cyber-attackers stole more than £20m from British bank accounts. (Source: BBC)

Researchers: Microsoft Office security hole exploited by hackers and government agencies

Microsoft recently released a security patch to resolve a vulnerability in Microsoft Office. Attackers, including malware distributors and cyber-espionage groups, are exploiting the flaw to seize control of users' systems.
The personal data of 100,000 taxpayers has been compromised through an exploit of the FAFSA program. (Source: IRS)

Hackers compromise U.S. taxpayer data through university financial aid system

Using an exploit in the Free Application for Federal Student Aid and tools used to retrieve tax data, hackers were able to breach part of the IRS database and steal personal data for 100,000 U.S. taxpayers.
Holding a picture of the owner's face in front of the camera seems to be enough. (Source: iDeviceHelp)

Samsung Galaxy S8 can be unlocked with a photograph

A video has surfaced of Samsung's new Galaxy S8 being tricked into unlocking with a photograph, raising questions of security.
The U.S. House of Representatives has signed the action to repeal FCC regulations concerning user privacy.

United States House of Representatives votes to allows ISPs to sell browsing history

Both the House and Senate have now voted to allow ISPs to sell the personal data of their customers. The measure will go before President Trump, who is expected to sign the bill into action.
Look-alike iPads could be used as bombs aboard flights. (Source: Apple)

An iPad bomb threat partly led to the recent device ban on flights

Islamic terrorists have been plotting to use iPads as bombs, which would be smuggled into a plane's passenger cabin and detonated mid-flight. Such a plot forms part of the reasoning behind the recent laptop and tablet bans on US & UK flights.
With the search box, users can find any publicly-shared sensitive information. (Source:

Publicly-shared documents hosted on expose sensitive information

Researchers as well as everyday users have discovered a trove of easily-accessible sensitive information on From phone numbers to social security numbers, the info is just a quick search away, open for malicious actors to steal and exploit.
Arizona Senator Jeff Flake introduced the repeal of the FCC regulations. (Source: Washington Times)

ISPs can sell your browsing history without your consent, Senate rules

FCC regulations that would disallow ISPs to share or sell users' internet browsing history and other private information without their explicit consent have been shot down in the US Senate.
Most Android phones in the US are running old security software. (Source: Skycure)

Most Android devices are running old security patches and could be vulnerable

A whopping 71% of Android devices in the United States run security patches that are 2 months old or older. This could leave them vulnerable to exploits made known in the latest security update logs.
Wikileaks says the CIA specifically targeted Apple products

Wikileaks says the CIA specifically targeted Apple products

The notorious activist group says that the CIA developed specialized tools to specifically target and infiltrate Apple products, namely Macbooks and iPhones. The tools have been in use since at least 2008.
T-Mobile's Scam ID service will identify possible scam phone calls. (Source: T-Mobile)

T-Mobile fights scammers with call warnings

Two new programs, Scam ID and Scam Block, will help T-Mobile customers avoid scam phone calls by identifying known scam numbers and warning users. Clients can also opt in to Scam Block, which outright blocks known scammers.
Google has admitted that less than half of the active Android devices in 2016 received security updates. (Source: Phone Arena)

Google promises better security for Android in 2017

Google has promised to provide more frequent and timely security updates for Android in 2017 due to the increasing number of Android-powered devices and the corresponding threat from malware.
Lenovo ThinkPad 13 2017 (Core i7, Full-HD) Laptop Review

87% Lenovo ThinkPad 13 2017 (Core i7, Full-HD) Laptop Review

A worthy successor? Following Lenovo’s delivery of a good outcome in the business sector with its ThinkPad 13 last year, the manufacturer now sends the successor based on Kaby Lake CPUs into the race. We examined whether Lenovo is successful and has listened to our complaints concerning the predecessor.
Intel Core i7-7500U | Intel HD Graphics 620 | 13.3" | 1.4 kg
The CI549 Nano is a passively cooled mini PC made for businesses. (Source: ZOTAC)

Zotac set to release business-centric mini PCs at CeBIT 2017

The small form factor PCs are meant for business professionals and sport features like Intel AMT and Intel UNITE.
China has been facing criticism regarding economic policies viewed as unfriendly to many foreign companies. (Source: Karishma Sheth)

Apple invests US$500 million into opening two more Chinese R&D centers

Apple has announced it will open two more research and development centers in Suzhou and Shanghai. The two additional centers will join the existing two slated to open in Beijing and Shenzhen. The total cost of the investment will be at least US$500 million.
Microsoft's resolution to a problem they created is to upgrade your PC to Windows 10. (Source: Microsoft)

Microsoft blocks Windows 7 and 8.1 updates for Kaby Lake and Ryzen PCs

As promised by the Redmond company last year, Microsoft will soon begin blocking updates for Windows 7 and 8.1 on Kaby Lake and Ryzen platforms.
Family Link offers parents a new way to manage Android devices. (Source: Google)

Google offers a solution to content management through Family Link

The service (currently invite-only) allows parents to restrict their children's use of Android devices. Parents can control what apps are downloaded, limit screentime, and lock a device at certain intervals during the day.
The extravagantly designed phones fetched an equally extravagant price tag (Source: Sirin Labs)

Sirin Labs' ultra-secure $16,000 smartphone is no more

Solarin, a really expensive Android smartphone focused on security and marketed towards business consumers, is no longer the company's focus. However, it will continue to receive official support for at least a year.
The malware came pre-installed on various Android devices, including some Samsung phones

Severe malware infection discovered in 38 Android device models

What makes this infection noteworthy is not that it exists, but the circumstances surrounding it. The malware was found to come pre-installed on the devices, meaning there was no way for users to avoid it.
As of March 2017, about 97.2% of Android devices may be vulnerable to exploits in WikiLeaks' latest documents. (Picture source: Android Developers)

Google says it has patched exploits used by the CIA

Google is confident that the latest versions of Android and Chrome are not vulnerable to the hacking tools detailed in the latest Wikileaks dump. Older versions of the software, however, may still be vulnerable.
The "Weeping Angel" exploit tricks users into thinking the TV is powered off while it is actually on and recording. (Source: Samsung)

Wikileaks reveals trove of CIA hacking tools for iOS and Android-driven devices

WikiLeaks has released a trove of information revealing the range of the CIA's hacking exploits and cyber-ordinance, including malware to use Samsung smart TV's for surveillance.
"Smart" devices are smart because they collect and learn from data they collect from their users. (Source: The Motley Fool)

Consumers are still (rightfully) wary of smart home devices

A new research report released by Gartner has revealed consumers to be wary of the risks of IoT devices while skeptical of their benefits.
IBM has started programming an API for their quantum computers. (Source: IBM)

IBM creates IBM Q to sell quantum computers

Quantum computing may be years off, but IBM thinks the technology has come far enough to begin programming and applying quantum computers. Big Blue plans to start programming a new API for the machines.
The HP Pro x2 is the first device to sport the new NanoSaver slot. (Source: Kensington)

Kensington releases lock for ultra-thin devices

Kensington has announced the release of the first security lock designed for ultra-thin systems. The NanoSaver Keyed Laptop Lock has a head of only 10mm, and is making its debut in the HP Pro x2 2-in-1.
BlackBerry KeyOne Smartphone Review (First Impressions)

BlackBerry KeyOne Smartphone Review (First Impressions)

Press me! TLC's new KeyOne is a new Blackberry smartphone with a physical keyboard. The KeyOne combines a 4.5-inch touchscreen with a pressure-sensitive keyboard, which can also be used as a trackpad at the same time. Here are our initial impressions of the device at the launch of MWC in Barcelona.
Qualcomm Snapdragon 625 | Qualcomm Adreno 506 | 4.5" | 180 g
Blackberry: KeyOne Smartphone announced

MWC 2017 | Blackberry: KeyOne Smartphone announced & Hands-On

Blackberry fans will be happy about a new handheld with mechanical buttons after the button-less DTEK60. Blackberry calls the new smartphone KeyOne, which is once again manufactured by TCL and equipped with Blackberry's Android based software with special security features.
Google and Microsoft have volunteered to enact new anti-piracy measures in the UK. (Source: TechTimes)

Google and Microsoft agree to censor pirated movies, music, and sport websites in the UK

Google and Microsoft have joined a voluntary anti-piracy action in the UK which has the companies demote search results for website where pirated music, movies, or sporting events can be found.
Acer's TravelMate P449 under review. (Source: Acer)

80% Acer TravelMate P449-M-7407 Notebook Review

Second best. The P449-M-7407 is the latest 14" notebook from Acer's TravelMate series. The device is aimed at business professionals looking for a portable and affordable notebook in the highly competitive business market. While it has its shortcomings, the P449 is a well-rounded device. Can this Jack of all trades best the competition, or is it merely the court fool?
Intel Core i7-6500U | Intel HD Graphics 520 | 14" | 2 kg
HP to launch Sure Click cyber protection for the EliteBook x360 1030 G2 this Spring

HP to launch Sure Click cyber protection for the EliteBook x360 1030 G2 this Spring

HP will tackle web-based security threats with new software designed specifically for its Elite series of business PCs.

Working For Notebookcheck

Are you a loyal reader of notebookcheck? Are you a techie who knows how to write? Then join our Team!

Especially wanted: 
Review Editor - 
Details here
News Editor - Details here






Please share our article, every link counts!
> Notebook / Laptop Reviews and News > News > Topics
Redaktion, 2013-05- 8 (Update: 2013-09-27)