Google is revealing some new numbers around malware and phishing attempts in an effort to get more people thinking about online security and to make the Web safer.
The U.S. National Security Agency (NSA) can retain communications of U.S. citizens or residents potentially indefinitely if those communications are encrypted, according to a newly leaked secret government document.
SAP has significantly improved the security of its products over the past few years but many of its customers are negligent with their deployments, which exposes them to potential attacks that could cripple their businesses, according to security res...
If you're thinking about encrypting email in light of revelations about U.S. government spying, you may be wasting your time.
Data encryption could help enterprises protect their sensitive information against mass surveillance by governments, as well as guard against unauthorized access by ill-intended third parties, but the correct implementation and use of data encryption...
Medical device makers should take new steps to protect their products from malware and cyberattacks or face the possibility that U.S. Food and Drug Administration won't approve their devices for use, the FDA said.
Bromium's small virtual machines have been updated to protect users who send documents or connect to public wireless hotspots when on the move.
European Union lawmakers have delayed a vote on what authorities can do with airline passengers' data following the revelations about the U.S. National Security Agency's Prism data collection system.
Google has denied involvement in a U.S. government surveillance program called Prism since news broke Thursday that the National Security Agency has been accessing the servers of some of the largest Internet companies, but now company executives insi...
Aiming to better address the security needs of businesses of all sizes that are facing increasingly complex attacks, McAfee has added two endpoint security suites to its product lineup.
Norwegian operator Telenor will use special software to ensure that all personal and sensitive content is deleted from smartphones and tablets handed in by users for recycling, a change it hopes will result in fewer customers holding on to their old ...
The designs for over two dozen advanced U.S. weapon systems, including missile defenses, combat aircraft and ships, were reportedly accessed by Chinese hackers.
Microsoft brushed off a dubious hacker's claim on Thursday that he stole 47 million account credentials for Microsoft's Xbox Live gaming service.
Hoping to entice more enterprises to use the R statistical programming language directly within their predictive modeling and data visualization jobs, Tibco has released a free version of its R runtime engine.
Hackers who commandeered The Onion's Twitter account used simple but effective phishing attacks to obtain passwords, according to a writeup by the publisher's technology team.
Most Popular Reviews
- 1 Microsoft Surface Pro 3 Windows 8.1 tablet
- 2 Samsung Galaxy Tab S (10.5) 4G review
- 3 TomTom Runner Cardio GPS watch
- 4 LG G3 review
- 5 Nokia Lumia 930 review
Best Deals on GoodGearGuide
Latest News Articles
- Intel pushes factory IoT with $9 million cost savings at plant
- Malware program targets Hong Kong protesters using Apple devices
- Google triples bug bounty reward range to $15,000
- Ellison pushes Oracle's new Cloud platform hard, but questions linger
- Shellshock flaw could pose risks to payments industry
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.