Thousands of wireless IP cameras connected to the Internet have serious security weaknesses that allow attackers to hijack them and alter their firmware, according to two researchers from security firm Qualys.
Bitcoin's roller-coaster price swings on Wednesday were caused by an influx of new buyers and software that couldn't keep up, according to the largest exchange, Mt. Gox.
The high-end Canon EOS-1D X camera can be hacked for use as a remote surveillance tool, with images remotely downloaded, erased and uploaded, a researcher said during the Hack in the Box security conference in Amsterdam on Wednesday.
Ubisoft Entertainment said Wednesday it took its Uplay download service offline until it fixes an issue that reportedly allowed hackers to download games, including one yet to be released.
System administrators and IT security pros can take bit of a breather: Microsoft has issued a comparatively light set of patches for this edition of its monthly release of software vulnerability fixes.
The PostgreSQL developers released updates for all major branches of the popular open-source database system on Thursday in order to address several vulnerabilities, including a high-risk one that could allow attackers to crash the server, modify con...
Security vendor Sophos has released an update for the software used on its Web gateway security appliance in order to address three serious vulnerabilities in the product's Web-based user interface.
An online bitcoin storage service, Instawallet, said Wednesday it is accepting claims for stolen bitcoins after the company's database was fraudulently accessed.
A flaw in the widely used BIND DNS (Domain Name System) software can be exploited by remote attackers to crash DNS servers and affect the operation of other programs running on the same machines.
Most browser installations use outdated versions of the Java plug-in that are vulnerable to at least one of several exploits currently used in popular Web attack toolkits, according to statistics published Monday by security vendor Websense.
Two security vendors have released temporary fixes for a flaw in some Samsung Android phones that could allow an attacker to bypass a locked screen.
Users of Origin, the game distribution platform of Electronic Arts (EA), are vulnerable to remote code execution attacks through origin:// URLs, according to two security researchers.
Hackers can influence real-time traffic-flow-analysis systems to make people drive into traffic jams or to keep roads clear in areas where a lot of people use Google or Waze navigation systems, a German researcher demonstrated at BlackHat Europe.
The majority of email and Web gateways, firewalls, remote access servers, UTM (united threat management) systems and other security appliances have serious vulnerabilities, according to a security researcher who analyzed products from multiple vendor...
A U.S. government computer vulnerability database and several other websites at the National Institute of Standards and Technology have been down for nearly a week after workers there found malware on two Web servers.
Latest News Articles
- Ruby on Rails security updates patch XSS, DoS vulnerabilities
- Hacker-built drone can hunt, hijack other drones
- Linux gaming may advance as Valve joins open-source association
- Lowepro Photo Hatchback 22L AW camera backpack
- Here's why Amazon drones may never land at your door
Most Popular Articles
- 1 How to update your Samsung Galaxy S4 to Android 4.3 Google Edition
- 2 Samsung targets Galaxy of kids with latest tablet
- 3 Aldi's new budget 8in Android tablet has 3G, makes phone calls
- 4 Capacitive vs resistive touchscreens
- 5 Tethering tutorial: How to use your iPhone as a modem
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Best Deals on GoodGearGuide
Best Deals on PCWorld
- TabletsView all »
- NotebooksView all »
- Mobile PhonesView all »
- Printers & ScannersView all »
- Networking, Wireless & VoIPView all »