Following similar initiatives by Apple, Google and Facebook, Microsoft is enabling two-factor authentication for its Microsoft Account service, the log-on service for many of its online and desktop products.
The chief sponsor of the Cyber Intelligence Sharing and Protection Act (CISPA) in the U.S. Congress has ignited a Twitter storm by suggesting many opponents of the proposed cyberthreat sharing bill are 14-year-olds in basements.
Pirate Bay co-founder Gottfrid Svartholm Warg was charged with hacking the IBM mainframe of Logica, a Swedish IT firm that provided tax services to the Swedish government, and the IBM mainframe of the Swedish Nordea bank, according to the Swedish pub...
Cybercriminals are increasingly targeting small businesses due to their less sophisticated defenses, according to a new report from Symantec.
The Cyber Intelligence Sharing and Protection Act (CISPA), a controversial cyberthreat information-sharing bill, will be debated on the floor of the U.S. House of Representatives this week, despite continued opposition from some privacy and digital r...
A poker software developer plans to implement a fix this week for a vulnerability recently discovered by two security researchers who analyzed one of its gambling applications.
Hackers could use vulnerable charging stations to prevent the charging of electric vehicles in a certain area, or possibly even use the vulnerabilities to cripple parts of the electricity grid, a security researcher said during the Hack in the Box co...
Bitcoin's roller-coaster price swings on Wednesday were caused by an influx of new buyers and software that couldn't keep up, according to the largest exchange, Mt. Gox.
“Improving users' experience” is not justification for using consumer information in Big Data projects according to Europe's top data protection officials.
The high-end Canon EOS-1D X camera can be hacked for use as a remote surveillance tool, with images remotely downloaded, erased and uploaded, a researcher said during the Hack in the Box security conference in Amsterdam on Wednesday.
Social network's new overlay for Android smartphones 'would be the first thing I would block on my network,' said one security adviser
An analysis of a piece of Android spyware targeting a prominent Tibetan political figure suggests it may have been built to figure out the victim's exact location.
Finding seen as warning to U.S. companies that mobile OSes are the likely path to cyberespionage attacks
A 28-year-old Romanian man was sentenced on Tuesday to five years in prison for his role in a phishing scheme, as part of a seven-year investigation by the U.S. Department of Justice.
Security vendors analyzing the code used in the cyberattacks against South Korea are finding nasty components designed to wreck infected computers.
Latest News Articles
- Mt. Gox trustee leaves door open to revival of Bitcoin exchange
- SQL injection flaw in Wall Street Journal database led to breach
- Google has to face US privacy suit over new user data policy
- Apple hit with class action lawsuit for alleged labor rule violations
- Panasonic Lumix DMC-FZ1000 digital camera with 4K video shooting
Most Popular Articles
- 1 What does an NBN connection look like in a new home?
- 2 Buying guide: Ovens, cooktops and freestanding cookers (upright ranges)
- 3 The most disturbing YouTube videos of all time
- 4 Tethering tutorial: How to use your iPhone as a modem
- 5 Microsoft WPC 2014: Cloud message resonating with Microsoft partners
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Best Deals on GoodGearGuide
- Notebooks View all »
- Tablets View all »
- Mobile Phones View all »
- TVs View all »
- Digital Cameras View all »