If you think spam attacks were bad in 2009, just wait until 2010 gets going.
The Internet has loosened the control Chinese authorities hold over information in the country, but censorship there will remain strong despite Google's threat to leave China.
Rootkits, a type of stealth technology used by malware malefactors, attempt to hide in the dark corners of an infected PC and evade detection. A new post out today from the Microsoft Malware Protection Center shines the spotlight on the evil tools.
If you're concerned about the privacy implications of reading digital books, take a look at a nice guide put up yesterday by the Electronic Frontier Foundation.
Many organizations are embracing SOA as a way to increase application flexibility, make integration more manageable, lower development costs, and better align technology systems to business processes. The appeal of SOA is that it divides an organizat...
Facebook is tracking your every move on the site -- or so says one purported Facebook employee, according to an anonymous interview with the Rumpus. In the interview, the Facebook employee, whose identity was protected so she wouldn't lose her job fo...
2009 ushered in mobile malware with the first (and second) iPhone worm appearing just before Christmas.
Lost in the flurry of products announcements at last week's Consumer Electronics Show was Facebook CEO Mark Zuckerberg's suggestion on Friday that some aspects of privacy are a thing of the past. The Facebook founder's comments were part of an inter...
A decade after the Y2K crisis, date changes still pose technology problems, making some security software upgrades difficult and locking millions of bank ATM users out of their accounts.
A new administration in Washington this year was expected to herald sweeping changes on the national cybersecurity front.
Social engineering, the act of tricking people into giving up sensitive information, is nothing new. Convicted hacker Kevin Mitnick made a name for himself by cold-calling staffers at major U.S. companies and talking them into giving him information....
Facebook was built as a powerful social connector, allowing users to befriend others with similar interests, locations, schools, and more.
The reports of the Windows "black screen of death" seem to be greatly exaggerated and hardly worth mentioning.
The holiday season is upon us, and now more than ever that means shopping on the Internet.
It was a notable accomplishment when Windows 7 was not impacted in any way by the vulnerabilities addressed in the six Security Bulletins released by Microsoft for the November Patch Tuesday. It would be even more impressive if Windows 7 proved invul...
Most Popular Reviews
- 1 Playing chicken with a Tesla Model S
- 2 Audi TT (2015) review: A smarter take on the sports coupe
- 3 Microsoft Lumia 640 review: Honouring Nokia's legacy
- 4 Apple Watch review: saving time
- 5 Samsung SUHD smart TV (JS9500) review
Join the Good Gear Guide newsletter!
Deals on Good Gear Guide
- Networking, Wireless & VoIP
Deals on Good Gear Guide
Latest News Articles
- How encryption keys could be stolen by your lunch
- Vulnerability found in Samsung smartphone keyboard
- Mac users exposed by zero-day vulnerability
- Breaking Bad-themed crypto-ransomware hits Australian computers
- Microsoft wants to kill passwords with biometric authentication in Windows 10
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.