Kaspersky Lab's Internet Security 2013 product contains a bug that can be exploited remotely, especially on local networks, to completely freeze the OS on computers running the software.
Evernote is speeding up its plans to offer two-factor authentication to users following a recent data breach that exposed user names, email addresses and encrypted passwords.
Security researchers warn that cybercriminals have started using Java exploits signed with digital certificates to trick users into allowing the malicious code to run inside browsers.
The administrators of a popular iOS developer Web forum called iPhoneDevSDK confirmed Wednesday that it had been compromised by hackers who used it to launch attacks against its users. Security experts believe the site served as a gateway for the rec...
Adobe Systems said it will release patches for two critical vulnerabilities disclosed last week that are actively being used by attackers.
A recently found exploit that bypasses the sandbox anti-exploitation protection in Adobe Reader 10 and 11 is highly sophisticated and is probably part of an important cyberespionage operation, the head of the malware analysis team at antivirus vendor...
Researchers from security firm FireEye claim that attackers are actively using a remote code execution exploit that works against the latest versions of Adobe Reader 9, 10 and 11.
Political activists from the Middle East were targeted in attacks that exploited a previously unknown Flash Player vulnerability to install a so-called lawful interception program designed for law enforcement use, security researchers from antivirus ...
McAfee is enhancing its business security platform by adding near real-time querying capabilities to its ePolicy Orchestrator software and by integrating it with its security information and event management (SIEM) product to automatically initiate e...
The Wall Street Journal said Thursday it had been targeted by hackers trying to monitor the newspaper's coverage of China, less than a day after a similar revelation from its competitor The New York Times.
Hackers from China breached the computer network of The New York Times and stole passwords that allowed them to gain access to computers and email accounts for a period of four months, the newspaper reported late Wednesday.
Kaspersky Lab on Wednesday made its bid to reduce the complexity associated with managing IT security processes in corporate environments, with a new product that combines the company's anti-malware technology with new mobile and system management to...
Wickr, a mobile messaging application that electronically shreds communications, has added the ability to send documents from Dropbox, leave video messages and a more secure way to search for other users of the application.
The website for Reporters Without Borders was booby-trapped to deliver malicious software using the latest Java and Internet Explorer vulnerabilities, security vendor Avast said on Tuesday.
Trend Micro has spotted a piece of malicious software that masquerades as the latest patch for Java, a typically opportunistic move by hackers.
Latest News Articles
- Activists want net neutrality, NSA spying debated at Brazil Internet conference
- Google invites Glass wearers to brave LA's beaches
- Telerik frees HTML5 collection of components
- Space X rocket en route to ISS with space laser cargo
- AMD steers clear of low-cost tablet market
Most Popular Articles
- 1 Buying guide: Ovens, cooktops and freestanding cookers (upright ranges)
- 2 Tethering tutorial: How to use your iPhone as a modem
- 3 The most disturbing YouTube videos of all time
- 4 LCD vs plasma vs LED TVs buying guide
- 5 Aldi's new budget Android smartphone isn't very good value
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Best Deals on GoodGearGuide
- Notebooks View all »
- $1449 free shipping
- $799 free shipping
- Tablets View all »
- Mobile Phones View all »
- TVs View all »
- Digital Cameras View all »