The IT mantra for the past few years has been all about the cloud, and the myriad benefits of cloud-based servers and storage. While there are some advantages, there are also some serious drawbacks that you should consider carefully before entrusting...
The Waledac botnet, crippled by legal action from Microsoft and covert infiltration by security researchers just a year ago, appears poised for a big comeback.
Mobile network operators are trailing their fixed-line counterparts by several years in regards to security, with many experiencing outages and other problems due to the use of outdated security technology, according to a new report released Tuesday ...
Facebook straddles a precarious line when it comes to information security and data privacy. As a social networking site, its very existence is based on the premise of freely sharing information -- status updates, photos, likes, location check-ins --...
A new report from Akamai Technologies shows that hackers appear to be increasingly using the Telnet remote access protocol to attack corporate servers over mobile networks.
Facebook founder Mark Zuckerberg appears to be the second high-profile victim of a hacking attack on his own Facebook page, following a similar account takeover early this week targeting French president Nicolas Sarkozy.
A piece of banking malware that researchers have been keeping an eye on is adding more sophisticated capabilities to stay hidden on victims' PCs, according to the vendor Seculert.
Researchers have developed a low-profile Trojan horse program for Google's Android mobile OS that steals data in a way that is unlikely to be detected by either a user or antivirus software.
The recent military and U.S. State Department Wikileaks fiasco epitomizes a key challenge to data security and privacy today: the authorized insider threat.
Paul Laverack of London is an actor, but he's considering a possible career change -- to computer security.
Last year Adobe got the message that it was the target du jour for malicious attacks and stepped up its efforts to secure and protect its software. However, a security researcher revealed that one of the security measures developed by Adobe can be ci...
It is almost mind-boggling how much data can be stored on a portable drive or USB thumb drive. As convenient as it is it to be able to carry 1TB of data in your pocket, though, portable drives are also easily lost or stolen, and gallivanting about ca...
A security researcher has found a gap in the way Adobe Systems has fortified its Flash Player for better security, which could result in data being stolen and sent to a remote server.
Have you ever noticed that insurance seems to operate on the Murphy's Law principle? If you have it, you never need it, but as soon as the insurance is gone a catastrophe strikes. That is pretty much how backing up data often works.
The Cloud Security Alliance (CSA) has launched a revision of the Cloud Controls Matrix (CCM). The new matrix (version 1.1), available for free download, is designed to provide fundamental security principles to guide cloud vendors and help prospectiv...
Latest News Articles
- Could Bitcoin's frothy venture funding dry up?
- AT&T to report on government requests for user data
- Alcatel sells federal technology unit for US$200 million
- Wall Street Beat: Economic growth, software news and BlackBerry deal boost tech stocks
- NSA defends foreign surveillance after new reports of targets
Most Popular Articles
- 1 Portable Air Conditioners
- 2 How to update your Samsung Galaxy S4 to Android 4.3 Google Edition
- 3 Tethering tutorial: How to use your iPhone as a modem
- 4 Capacitive vs resistive touchscreens
- 5 LCD vs plasma vs LED TVs buying guide
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Best Deals on GoodGearGuide
Best Deals on PCWorld
- NotebooksView all »
- TabletsView all »
- Mobile PhonesView all »
- Printers & ScannersView all »
- Networking, Wireless & VoIPView all »