A DIY guide to securing Android-based devices
The European Union's data retention law has come under scrutiny, with a new report saying that it poses significant risks to individuals' right to privacy.
Mobile printing has never been easier. For a busy office, reliable and easy-to-use tools are essential. Samsung's latest smart printers are equipped for wireless printing from mobile devices. Find out more about what is all about.
One day after a hacker posted screen shots and data to a hacking mailing list, saying he had broken into a New Mexico wind turbine facility, the company that runs the turbines says it has seen no evidence of a computer intrusion.
Claiming revenge for an "illegitimate firing," someone has posted screenshots and other data, apparently showing that he was able to break a 200 megawat wind turbine system owned by NextEra Energy Resources, a subsidiary of Florida Power & Light.
Apple today patched bugs in iOS and Safari used at last month's Pwn2Own hacking contest by three teams of researchers who collectively earned $45,000 for their work.
Oracle plans to release a large number of security patches for its various software products next week, including six bug-fixes for its flagship database software.
Hackers have compromised several servers that support WordPress and may have obtained source code, according to the founding developer of Automattic, the company behind the popular blogging platform.
A local security expert is dumbfounded by the ease in which a fake <i>Twilight: Breaking Dawn</i> game application has spread across Facebook, and has warned Australians to be less trusting when it came to approving applications on the social network...
Apparently, NSS Labs struck a nerve. NSS Labs revealed that almost all of the firewalls it tested for a recent report are susceptible to crash or compromise using common attacks. The firewall vendors in question, though, beg to differ and take except...
Toshiba Wednesday unveiled its first family of self-encrypting hard disk drives (HDDs) that can also erase data when connected to an unknown host.
Organisations could dramatically cut their exposure to vulnerabilities in Microsoft software simply by limiting Windows admin rights.
One of the big advantages of using Linux is that its security tends to be so much better than that of the competing alternatives.
Some of the most commonly-used firewalls are subject to a hacker exploit that lets an attacker trick a firewall and get into an internal network as a trusted IP connection.
Law enforcement organizations are making tens of thousands of requests for private electronic information from companies such as Sprint, Facebook and AOL, but few detailed statistics are available, according to a privacy researcher.
U.K. police arrested three men late last week in connection with using the SpyEye malware program to steal online banking details.
Latest News Articles
- How Nokia both helped and hindered Microsoft's earnings
- Five takeaways from the Apple earnings call
- Xiaomi's Mi4 brings a touch of Apple to the open world of Android
- More mobile gadgets than people? Seven countries - including Australia - now qualify
- Microsoft revenue lifted by Cloud sales to businesses
Most Popular Articles
- 1 What does an NBN connection look like in a new home?
- 2 Buying guide: Ovens, cooktops and freestanding cookers (upright ranges)
- 3 The most disturbing YouTube videos of all time
- 4 Tethering tutorial: How to use your iPhone as a modem
- 5 Microsoft WPC 2014: Cloud message resonating with Microsoft partners
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.