One of the first things a malware analyst does when encountering a suspicious executable file is to extract the text strings found inside it, because they can provide immediate clues about its purpose. This operation has long been considered safe, bu...
Many companies set up subdomains for use with external services, but then forget to disable them when they stop using those services, creating a loophole for attackers to exploit.
Apple will stop support next week for an encryption protocol found to contain a severe vulnerability, the company said on Wednesday.
Malicious advertisements made their way last week to almost two dozen popular websites and used browser-based exploits to infect computers with CryptoWall, a nasty file-encrypting ransomware program.
Microsoft has published a temporary fix for a new zero-day flaw that affects nearly all versions of Windows and is currently being exploited via PowerPoint.
If you haven't updated your Flash Player with the fixes released on Oct. 14, you may be vulnerable to new attacks using a commercial exploit kit called Fiesta, security researchers warn.
Network-attached storage (NAS) devices are riddled with vulnerabilities that can put the security of sensitive data and networks at risk, a researcher has found. To prove his point, he has created a proof-of-concept worm that can infect devices from ...
Users who are careful to download files only from trusted websites may be tricked by a new type of Web vulnerability: this one cons them into downloading malicious executable files that are not actually hosted where they appear to be.
A new technique that allows attackers to hide encrypted malicious Android applications inside images could be used to evade detection by antivirus products and possibly Google Play's own malware scanner.
A major change this year in how online advertisements are sold has been embraced by hackers, who are using advanced ad-targeting capabilities to precisely deliver malware.
Drupal has released a patch for a highly critical flaw in its content management system, which could allow rogue code to run.
Facebook is doubling the rewards it will pay for security vulnerabilities related to code that runs its advertising system, the company said Wednesday.
One of the zero-day flaws patched by Microsoft on Tuesday had been used for some time by a group with suspected Chinese government ties that targets technology companies, CrowdStrike's chief executive said.
After a relatively quiet few months, Microsoft Patch Tuesday is back in full force, covering three zero-day vulnerabilities that administrators should attend to as quickly as possible.
A cyberespionage group operating out of Russia has launched malware attacks against the Ukrainian government and at least one U.S.-based organization through a previously unknown vulnerability that affects most versions of Windows.
Most Popular Reviews
- 1 Playing chicken with a Tesla Model S
- 2 Audi TT (2015) review: A smarter take on the sports coupe
- 3 Microsoft Lumia 640 review: Honouring Nokia's legacy
- 4 Apple Watch review: saving time
- 5 Samsung SUHD smart TV (JS9500) review
Join the Good Gear Guide newsletter!
Deals on Good Gear Guide
- Networking, Wireless & VoIP
Deals on Good Gear Guide
Latest News Articles
- Xbox One, PS4 sales in China could be disappointing
- Wi-Fi password-sharing feature in Windows 10 raises security concerns
- In Japan, Uber dons white gloves to battle an elegant rival
- HP makes it official, files to spin off enterprise division
- PayPal to acquire money transfer service Xoom for $US890 million
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.