Many commercial software companies and enterprise in-house developers are churning out applications that are insecure by design due to the rapid and often uncontrolled use of open-source components.
A deeper look into the latest version of malware known as Duqu shows it used digital certificates from prominent contract manufacturer Foxconn Technology Group to help mask its activity.
A security researcher says a vulnerability in Apple's mobile email application could be used to trick someone into divulging their iCloud password.
VMware has released security updates for several of its virtualization products in order to address critical vulnerabilities that could allow attackers to break out of virtual machines and execute rogue code on the host operating systems.
Mozilla is giving a raise to security researchers who spot Firefox browser vulnerabilities, more than doubling its maximum reward for information on the most high-risk flaws.
Internet Explorer, always heavily scrutinized by both security researchers and online attackers, has once again gotten the majority of patches in this month's Microsoft's Patch Tuesday round of monthly bug fixes.
Adobe Systems fixed 13 security issues in Flash Player that could lead to serious attacks, including remote code execution and information disclosure.
The U.S. Army's website was defaced and later brought down Monday, with the Syrian Electronic Army (SEA) claiming responsibility.
The U.S. National Security Agency is reportedly intercepting Internet communications from U.S. residents without getting court-ordered warrants, in an effort to hunt down malicious hackers.
A researcher is warning that a gaming plug-in installed on over 200 million PCs contains a flaw that could let attackers steal users' data from websites they're logged into, such as their Web mail and social networking accounts.
In yet another testament of the awful state of home router security, a group of security researchers uncovered more than 60 vulnerabilities in 22 router models from different vendors, most of which were distributed by ISPs to customers.
A zero-day software vulnerability in the firmware of older Apple computers could be used to slip hard-to-remove malware onto a computer, according to a security researcher.
Identifying users who access Tor hidden services -- websites that are only accessible inside the Tor anonymity network -- is easier than de-anonymizing users who use Tor to access regular Internet websites.
The majority of 3G and 4G USB modems offered by mobile operators to their customers have vulnerabilities in their Web-based management interfaces that could be exploited remotely when users visit compromised websites.
A fix has been released for a vulnerability in a widely used piece of code in Android devices, which could cause apps to crash or display unwanted dialog boxes.
Most Popular Reviews
- 1 LG 65-inch UHD TV (65UF950T) review
- 2 Playing chicken with a Tesla Model S
- 3 Audi TT (2015) review: A smarter take on the sports coupe
- 4 Microsoft Lumia 640 review: Honouring Nokia's legacy
- 5 Apple Watch review: saving time
Join the Good Gear Guide newsletter!
Deals on Good Gear Guide
- Networking, Wireless & VoIP
Deals on Good Gear Guide
Latest News Articles
- The Upload: Your tech news briefing for Tuesday, July 7
- OpenSSL tells users to prepare for a high severity flaw
- Nvidia attempts to ease the path to deep learning
- FBI chief warns that terrorists hide behind encrypted communications
- Privacy group files FTC complaint to push Google to extend right to be forgotten to US
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
- FTPR & Corporate Affairs ManagerNSW
- CCDrupal DeveloperNSW
- CCInternal Communications ExecutiveNSW
- FTSenior Account Manager - PR AgencyNSW
- FTMedia and Communications AdvisorACT
- CCInternal Communications AdvisorNSW
- CCSenior Drupal DeveloperNSW
- FTTechnical Sales Support Representative - The Worlds largest Search Engine!NSW
- FTAccount Manager - PR AgencyNSW