A fake antivirus program in circulation uses at least a dozen stolen digital code-signing certificates, indicating cybercriminals are increasingly breaching the networks of software developers, Microsoft wrote on Sunday.
A new website allows Internet users to check if their usernames and passwords were exposed in some of the largest data breaches in recent years.
New attack campaigns have infected point-of-sale (PoS) systems around the world with sophisticated malware designed to steal payment card and transaction data.
Facebook, LinkedIn and other online services have been resetting accounts after 2 million login credentials, apparently stolen from users' computers, were discovered on a server in the Netherlands.
A new Trojan program that targets users of online financial services has the potential to spread very quickly over the next few months, security researchers warn.
A Boston-based company, Abine, is beefing its anti-tracking browser extension to let users shield their real credit card details, email addresses and phone numbers during web transactions.
Hackers reportedly stole 42 million customer records including email addresses and clear-text passwords from Cupid Media, a network of dating websites.
The vBulletin.com forum was not compromised by exploiting a previously unknown vulnerability as a group of hackers claimed, according to vBulletin Solutions, the company that develops the popular Internet forum software.
A group of hackers claim to have exploited an undocumented vulnerability in the vBulletin Internet forum software in order to break into the MacRumors.com and vBulletin.com forums.
Facebook locked some users out of their accounts after determining that their log-in credentials were exposed as a result of a security breach at Adobe. The company is asking users who used the same log-in credentials for Adobe's online services and ...
A new variant of a Trojan program that targets online banking accounts also contains code to search if infected computers have SAP client applications installed, suggesting that attackers might target SAP systems in the future.
Security experts used fake Facebook and LinkedIn profiles pretending to represent a smart, attractive young woman to penetrate the defenses of a U.S. government agency with a high level of cybersecurity awareness, as part of an exercise that shows ho...
Security protocol for the European Council president meant he would never have used the tainted USB stick allegedly given to him by Russia at the G20 Summit council sources confirmed Wednesday.
MongoHQ, which provides hosting and support for the open-source Mongo database, said attackers may have accessed several of its customers' databases earlier this week.
Buffer, a service for scheduling social media posts, said Sunday it has strengthened its security after spammers gained access to its network.
Latest News Articles
- Sony VAIO Fit Multi-flip 13 hybrid notebook
- Merry Christmas: Kogan donated $10K to support the open-source community
- Forza Motorsport 5 taps the Cloud for innovation
- ABC iView finally comes to Android
- China's largest bitcoin exchange forced to stop accepting deposits
Most Popular Articles
- 1 How to update your Samsung Galaxy S4 to Android 4.3 Google Edition
- 2 Tethering tutorial: How to use your iPhone as a modem
- 3 Capacitive vs resistive touchscreens
- 4 Portable Air Conditioners
- 5 Best tablets: Christmas 2013
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Best Deals on GoodGearGuide
Best Deals on PCWorld
- Printers & ScannersView all »
- NotebooksView all »
- TabletsView all »
- Mobile PhonesView all »
- Networking, Wireless & VoIPView all »