The increased monitoring and profiling of Internet users by companies such as Google and its DoubleClick online advertising subsidiary is widely seen as one of the biggest threats to online privacy. But in reality, said university professor Paul Ohm,...
Facebook, since its mistakes with the Beacon advertising incident, has rolled out one of the most robust security systems for any social network, which allows users to control who sees what information about them with great specificity. Take a look a...
Employee monitoring software is an amazingly useful, yet somewhat awkward technology. It can help your IT department weed out your worst time-wasters and layabouts — and even those who are sharing your corporate secrets. But while you may need to kee...
One of the worst privacy invaders the world has ever seen is the Internet. When you surf, Web sites can find out where you've been and can gather other information about you. Trojan horses and spyware can snoop on you. Key loggers can capture your ke...
Ever pass by a co-worker's unattended computer and consider taking a peek at her e-mails? Or have you ever thought it would be a funny prank to figure out your cube mate's e-mail password and break into his work account to mess with him?
Saving files on your hard drive is the easy part; choosing how to back up those files can be more difficult.
Security software customers are speaking with their feet: They want security updates and other security interruptions out of their faces, and they won't hesitate to dump their security suites because of performance drag -- whether or not it's actuall...
At first blush it seems like a typical 419 (or Nigerian letter) scam - the standard e-mail directing the intended victim to do certain things that supposedly result in a huge payoff to the latter.
As a vast flood of new malware threatens to overwhelm antivirus software, security companies have begun changing how their programs protect PCs. To avoid being left in the dust by the crooks, companies plan to turn the tables on them by allowing only...
Though sometimes it's hard to pin down exactly who deserves the credit — or blame — here's a shot a some of the more familiar terms.
Like most people visiting this site, you most likely live on the Internet. And that means you need help -- help with your home or business network for accessing the Internet, help with troubleshooting, help with downloading, and with e-mail, instant ...
What will happen to my earlier version of Firefox?
Whether you're looking for a job, a party or long-lost friends, your ideal online meeting place is out there. We uncover the best social-networking sites on the web.
Two years ago, GreenBorder, one of the early "sandbox" browsers, received mighty applause from Wall Street Journal tech guru Walt Mossberg. The sandbox browser -- basically, a browser running in a virtual container -- promised to keep nasty code from...
To use an Internet-connected computer is to be insecure and place your privacy in danger. Spyware, viruses, Trojans and assorted malware are everywhere on the Net, trying to hop onto your PC and cause damage. Snoopers want to get at your personal inf...
Most Popular Reviews
- 1 2016 Ford Mustang EcoBoost review
- 2 Review: TCL C1 series 4K TV
- 3 Sony 75-inch UHD TV (X9400C) review: Sony and Android are a winning duo
- 4 LG 55EG960T OLED UHD TV
- 5 Panasonic Viera UHD TV review: good hardware, fragmented software
Join the Good Gear Guide newsletter!
Best Deals on Good Gear Guide
Latest News Articles
- No more passwords with Google's Trust API
- A critical flaw in Symantec antivirus engine puts computers at risk of easy hacking
- Malware attacks on two banks have links with 2014 Sony Pictures hack
- Valve cleverly battles Steam cheaters with two-factor authentication
- New USB-C authentication spec protects against malware and shoddy chargers
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
- FTManager of Infrastructure ServicesVIC
- CCProgram ManagementWA
- CCTechnical Writer | Experimental military technology | NV1ACT
- CCSenior Systems AnalystACT
- CCBusiness AnalystVIC
- FTSenior Java Developer (Java/Maven/AEM)NSW
- FTMobility Developer x 2 - iOS and Android positions available!NSW
- CCSenior Project Delivery ManagerACT
- FTTechnical Lead - Tier 1 Customer interfaceACT
- FTTechnical/Solutions ArchitectNSW
- CCLead Solution Analyst - BMC Remedy softwareVIC
- FTIT Project ManagerAsia
- CCJava Developer with Oracle database experience | Defence intelligence | NV1ACT
- CCBusiness Analyst- Process Mapping Specialist- Gov / Bank backgdNSW
- CCContract System Analyst (Renewable Contract)Asia
- CCUrgent requirement for a Splunk SMEVIC
- CCITSM ConsultantNSW
- FTSAP Solution Architect- Data Migration to SAP HR, payrollNSW
- CCService Desk AnaystNSW
- CCJava DevelopersACT
- CCSharePoint AdministratorNSW
- CCIT Change Coordinator / AnalystNSW
- CCSolution Architect / Designer - Cyber SecurityNSW
- CCMicrosoft .NET Developer (Server and Applications)SA
- CCSystem Engineer (DevOps)WA