The source code of TrueCrypt, a popular disk encryption tool, is not the most polished work of programming, but it has no critical flaws or intentional backdoors, security testers concluded in a report released Monday.
Websites that use encryption could be elevated in Google search results sometime in the future, according to The Wall Street Journal.
Andrew Auernheimer, known online as "weev," has won an appeal against his conviction for exploiting a vulnerability in AT&T's website to collect the email addresses of Apple iPad users. The 2010 incident earned him a 41-month prison sentence.
Four researchers working separately have demonstrated a server's private encryption key can be obtained using the Heartbleed bug, an attack thought possible but unconfirmed.
Jose Vildoza's 62-year-old father was using his old Windows computer when a warning in broken English flashed on the screen: your files have been encrypted.
A 5-year-old San Diego boy has been commended by Microsoft for his security skills after finding a vulnerability in the company's Xbox games console.
In an attempt at clarity, Google has amended its terms of service to say that it analyzes private data, including emails, for purposes including the delivery of ads and customized search results.
Yahoo said Wednesday it was encrypting traffic flowing between its data centers, several months after leaked documents revealed the government had been sniffing those links.
Smaller financial institutions have been warned to look out for attacks that aim to increase the withdrawal limit on customer payment cards for fraud purposes.
Two banks that took legal action against Target over its recent data breach have withdrawn their claims, apparently due to an erroneous allegation against a security vendor also named in the suit.
Microsoft will no longer go through email messages and other personal data that users of its online services have stored on its servers, a decision taken after being sharply criticized for accessing a person's inbox as part of an internal investigati...
A new variant of the Gameover computer Trojan is targeting job seekers and recruiters by attempting to steal log-in credentials for Monster.com and CareerBuilder.com accounts.
A new variant of a malicious program called BitCrypt that encrypts files and asks victims for bitcoin payments is being distributed by a computer Trojan that first pilfers bitcoin wallets.
Security protections have been tightened at many of the major online services, as firms like Google and Microsoft pledge to protect their users against unwanted prying eyes. But while many people fret about unwarranted government access to their data...
Microsoft promised to subject itself to a more rigorous process before searching through its customers' email accounts in the future after a recent legal case revealed that the company searched for evidence of theft of its trade secrets in a Hotmail ...
Latest News Articles
- LTE network for US public safety taking it one step at a time
- Phone unlocking bill clears US House, next step is president's signature
- Oracle's new in-memory database option could spark unanticipated costs, expert warns
- Bose sues Beats over headphone patents
- SEC drops probe into Facebook's pre-IPO sales disclosures
Most Popular Articles
- 1 Buying guide: Ovens, cooktops and freestanding cookers (upright ranges)
- 2 What does an NBN connection look like in a new home?
- 3 The most disturbing YouTube videos of all time
- 4 Tethering tutorial: How to use your iPhone as a modem
- 5 How to connect your iPhone to your TV
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Best Deals on GoodGearGuide
- Notebooks View all »
- $22 free shipping
- $898.70 free shipping
- $1299 free shipping
- 9% off $439 free shipping
- Tablets View all »
- Mobile Phones View all »
- TVs View all »
- Digital Cameras View all »