Security researchers said they've spotted a new type of banking malware that rivals the capabilities of the infamous Zeus malware.
A project launched by CloudFlare, a provider of website performance and security services, allows organizations engaged in news gathering, civil society and political or artistic speech to use the company's distributed denial-of-service (DDoS) protec...
TrueCrypt remains the only way to encrypt Amazon Simple Storage Service (S3) data when using the AWS Import/Export tool, two weeks after the popular encryption software was abruptly discontinued by its creators, supposedly for security reasons.
Russian authorities arrested a man and a teenaged boy from Moscow under suspicion that they compromised Apple ID accounts and used Apple's Find My iPhone service to hold iOS devices for ransom.
The U.S. Army warned Thursday that databases holding information on 16,000 South Korean civilian employees of the U.S. military and applicants for base jobs may have been compromised.
A newly discovered vulnerability that allows spying on encrypted SSL/TLS communications has been identified and fixed in the widely used OpenSSL library.
The ransomware model is increasingly being adopted by cybercriminals who target mobile users, one of their latest creations being able to encrypt files stored on the SD memory cards of Android devices.
Responding to reports that it fails to encrypt the majority of its email traffic, Comcast said that it will ramp up domain-to-domain encryption efforts over the next few weeks.
Google has already received around 41,000 requests to delete links to personal information from its search results in the three weeks since a key ruling by the European Court of Justice about the so-called right to be forgotten.
Encryption is like a relationship -- both parties need to be on the same page for it to work. And Microsoft and Comcast are apparently not on Google's page.
Trend Micro is warning of a phishing campaign touting a "Heartbleed removal" tool, a nonsensical product that is actually malicious software.
Someday, if you use your non-dominant hand to control your mouse or touchpad when you're say, shopping online, websites might interpret your irregular scrolling and clicking as a sign of fraud and require you to prove your identity, thanks to an IBM ...
Inexpensive equipment can be used to disrupt vessel-tracking systems and important communications between ships and port authorities, according to two security researchers.
A new computer Trojan that targets users of 450 financial institutions from around the world appears to borrow functionality and features directly from the notorious Zeus and Carberp malware programs.
Security researchers uncovered a global cybercriminal operation that infected with malware almost 1,500 point-of-sale (POS) terminals, accounting systems and other retail back-office platforms from businesses in 36 countries.
Latest News Articles
- Apple faces privacy suit following Chinese TV report
- New guide aims to remove the drama of reporting software flaws
- Yamaha TSX-B232 desktop stereo review
- 'Canvas fingerprinting' tracking is sneaky but easy to halt
- Sony Cyber-shot RX100 III compact digital camera
Most Popular Articles
- 1 What does an NBN connection look like in a new home?
- 2 Buying guide: Ovens, cooktops and freestanding cookers (upright ranges)
- 3 The most disturbing YouTube videos of all time
- 4 Tethering tutorial: How to use your iPhone as a modem
- 5 How to connect your iPhone to your TV
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Best Deals on GoodGearGuide
- Notebooks View all »
- $1459 free shipping
- Tablets View all »
- Mobile Phones View all »
- TVs View all »
- Digital Cameras View all »