Hackers are now using a critical vulnerability in Android to modify legitimate smartphone applications, putting users at risk of being spied on.
An independent security researcher claimed responsibility for the security breach incident that forced Apple to close down its Developer Center website last week.
Security researchers from Polish vulnerability research firm Security Explorations claim to have identified a new vulnerability in Java 7 that could allow attackers to bypass the software's security sandbox and execute arbitrary code on the underlyin...
Cisco Systems released a security patch for its Unified Communications Manager (Unified CM) enterprise telephony product in order to mitigate an attack that could allow hackers to take full control of the systems. The company also patched denial-of-s...
The Apache Software Foundation has released Struts 22.214.171.124, a security update for its popular Java Web application development framework that addresses two vulnerabilities, including a critical one that could allow remote attackers to execute arbitr...
More fixes are appearing for a pair of highly dangerous vulnerabilities exposed earlier this month in the Android mobile operating system.
Oracle said on Tuesday that its monthly round of patches for July includes 89 fixes, 27 of which address remotely exploitable vulnerabilities in four widely used products.
Google's chances of obtaining the "http://search" domain name are shrinking after several committees affiliated with the Internet Corporation for Assigned Names and Numbers (ICANN) recently warned that dotless domain names could be harmful to the Int...
A new version of a file-infecting malware program that's being distributed through drive-by download attacks is also capable of stealing FTP (File Transfer Protocol) credentials, according to security researchers from antivirus firm Trend Micro.
Microsoft has already received several vulnerability reports that qualify for monetary rewards as part of the company's bug bounty program launched in June for the preview version of Internet Explorer 11.
Paying rewards to independent security researchers for finding software problems is a vastly better investment than hiring employees to do the same work, according to researchers from the University of California Berkeley.
Of the six critical security bulletins Microsoft issued in its Patch Tuesday monthly release of software updates, three address a vulnerability in how Microsoft software renders fonts.
Technical details and a proof-of-concept exploit have been published for a recently announced Android vulnerability that potentially affects millions of devices and allows attackers to turn legitimate apps into Trojan programs.
A noisy malware campaign against South Korea is revealing deeper secrets.
Hardware appliances used by broadcasters to transmit emergency communications contained vulnerabilities that could be exploited over the Internet, although patches are now available.
Most Popular Reviews
- 1 Samsung Galaxy Tab S (10.5) 4G review
- 2 LG G3 review
- 3 Nokia Lumia 930 review
- 4 Asus G550JK gaming notebook
- 5 Fetch TV set-top box
Best Deals on GoodGearGuide
Latest News Articles
- Round LG G Watch R has Plastic-OLED display, heart monitor and is waterproof
- IBM Watson now answers your questions before you ask
- Are Uber's aggressive recruitment tactics legal?
- PC market in 2014 a bit less dire than previously thought
- Cotap, a WhatsApp for the enterprise, links with cloud storage providers
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
- CCL2 Technical Support Engineer - RightFax/MessagingVIC
- FTMachine Learning | JAVA | San Fran based global Company | SydneyNSW
- FTMarketing Communications Executive - B2BNSW
- FTChief Information OfficerNSW
- FTAccount Manager Programmatic Trading DeskNSW
- FTSearch Account ManagerNSW
- FTInformation Services ManagerNZ