Users of the 4chan online message board managed to get access to the online student information system used by a New Jersey school district after the school's administrative password was posted to 4chan last week.
Until recently, "cyber war" has been reserved for science fiction thrillers -- like something you might expect from William Gibson. In the past few years, though, the concept has been gaining more mainstream acceptance as a real possibility, but a re...
Buying public cloud services passwords as demonstrated this week at the Black Hat D.C. conference is not the only malicious use these computational and storage resources might offer, according to one security expert.
The US Government's case against two men charged with hacking into AT&T's website to steal e-mail addresses from about 120,000 iPad users got a boost last year when a confidential source handed over 150 pages of chat logs between the two and other me...
Professed White Hat hackers face federal criminal charges for grabbing the e-mail addresses of 114,000 AT&T 3G customers who use iPads.
As the country's electricity grid undergoes a transformation and moves toward a more intelligently networked, automated system, it faces an increasing amount cybersecurity issues.
A former U.S. Transportation Security Administration contractor will serve two years in prison for messing with sensitive government databases used to identify terrorists as they try to enter the U.S.
An online retail site at University of Connecticut is warning thousands of customers that their billing information may have been hacked.
Recent data breaches at two banks underscore what's becoming a gnarly problem for companies that handle sensitive information: When does a hacked PC become a data breach?
South Korea has concluded that Google illegally collected personal data while collecting information for its Street View map service, an official at the country's National Police Agency (NPA) said on Thursday.
We were wrong -- so far -- that Carol Bartz would be ousted as Yahoo CEO by the end of this year, but we were right that Apple's tablet, whose name wasn't known at the end of last year, would be huge. OK, so that second one was probably a given, but ...
If you think your Gawker account has been compromised by this weekend's attack and you want to cancel it, you can't.
Laptops can be stolen. Neoflyer asked the PCWorld.com Answer Line forum for tips on protecting them.
People using a tool to conduct distributed denial-of-service (DDOS) attacks against other websites in support of WikiLeaks can easily be traced, according to computer security researchers.
E-mail addresses and password details for 200,000 registered users of Gawker Media websites are now circulating on peer-to-peer networks after a weekend hack attack. The company warned users to change their passwords -- including on other sites, if t...
Most Popular Reviews
- 1 LG 65-inch UHD TV (65UF950T) review
- 2 Playing chicken with a Tesla Model S
- 3 Audi TT (2015) review: A smarter take on the sports coupe
- 4 Microsoft Lumia 640 review: Honouring Nokia's legacy
- 5 Apple Watch review: saving time
Join the Good Gear Guide newsletter!
Deals on Good Gear Guide
- Networking, Wireless & VoIP
Deals on Good Gear Guide
Latest News Articles
- Microsoft offers researchers $500K to work on HoloLens
- GoPro Hero4 Session: half the size and waterproof to 10 metres
- The Upload: Your tech news briefing for Monday, July 6
- Leak of ZeusVM malware building tool might cause botnet surge
- Giant mecha robots from Japan, US will meet in epic battle
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.