As mobile users are more frequently pestered by SMS spam, one security vendor is applying its experience in stopping e-mail spam for mobile networks.
Given the slew of embarrassing stories you've no doubt seen about users accidentally sharing too-personal information, the idea of preserving privacy on a social network may seem like going outside during a thunderstorm and expecting to stay dry.
Mobile printing has never been easier. For a busy office, reliable and easy-to-use tools are essential. Samsung's latest smart printers are equipped for wireless printing from mobile devices. Find out more about what is all about.
Our Web sites are under attack! And my company's firewall and intrusion-detection systems seem to have been giving a lot of people around here a false sense of security.
A U.S. company that says its code was copied by a Chinese Internet filtering program has ordered more PC makers not to distribute the Chinese software.
How do you make a terrible thing even worse? If you're a crook who operates a botnet -- an often-expansive network of malware-infected PCs -- you link botnets together to form a gargantuan "botnetweb." And you do it in a way that's hard for an antivi...
China will submit its wireless LAN security protocol to the International Organization for Standardization (ISO) for consideration as a global standard, years after its rejection by the standards body incensed Chinese backers.
The Kantara Initiative, formed to promote interoperability among identity verification applications and services, launched on Wednesday with big-name backers like Oracle, Intel, eBay's PayPal, AOL, CA, Novell, Fidelity Investments, Liberty Alliance, ...
Nations increasingly touched by cyberattacks are still in the very early stages of figuring out how to deal with incidents that could escalate into critical national security threats.
Who should know more about PC threats than the company whose software makes most of them possible? Is Microsoft's upcoming, free anti-malware app the company's way of apologizing to customers?
The U.S. government has significant work to do before it can better cooperate with the private sector and other governments to better protect cybersecurity, a government cybersecurity expert said.
NEW YORK CITY -- Imagine a situation where a powerful country wants to annex its small neighbor, so it launches a week-long campaign of cyberattacks aimed at disrupting the financial, energy, telecom and media systems of its neighbor's biggest ally. ...
Twitter users who thought friends were directing them to a "funny blog" Thursday ended up experiencing something completely different: a phishing scam.
The U.S. government says it's lost - yes, lost - an entire hard drive full of sensitive data. The external drive, stored at the U.S. National Archives and Records Administration, held personal data from the Clinton era, including information about Wh...
A new attack that peppers Google search results with malicious links is spreading quickly, the U.S. Computer Emergence Response Team warned on Monday.
I am a genius. I'm charismatic, kind, and understanding. I'm also a Disney princess named Aurora and the reincarnation of Marilyn Monroe.
Most Popular Reviews
- 1 Microsoft Surface Pro 3 Windows 8.1 tablet
- 2 Samsung Galaxy Tab S (10.5) 4G review
- 3 LG G3 review
- 4 Nokia Lumia 930 review
- 5 Asus G550JK gaming notebook
Best Deals on GoodGearGuide
Latest News Articles
- Amid dueling lawsuits, state needs Oracle's help with health-insurance site transition
- First mobile device with MIPS 64-bit processor coming in 2016
- AMD's new eight-core FX chips based on aging Piledriver architecture
- Uber vows to defy German ban on its UberPop ride-sharing service
- Namecheap says accounts compromised in hacking incident
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.