A recently patched Java remote code execution vulnerability is already being exploited by cybercriminals in mass attacks to infect computers with scareware, security researchers warn.
A well-known cyber-spying tool called Gh0st RAT is still being employed in stealthy malware attacks, according to a new report from security firm FireEye.
Java vulnerability hunters from Polish security research firm Security Explorations claim to have found a new vulnerability that affects the latest desktop and server versions of the Java Runtime Environment (JRE).
Twitter users in the Netherlands are being targeted by a piece of malware that hijacks their accounts, according to security vendor Trusteer.
Wikileaks' latest release is billed as a transcript of a "secret meeting," but it may more accurately be termed a promotion.
A Russian porn site is delivering malware that uses the victims' computers to mine bitcoins, according to research from ThreatTrack Security.
Thirteen popular home and small office routers contain security problems that could allow a hacker to snoop or modify network traffic, according to new research.
Cybercriminals are increasingly targeting small businesses due to their less sophisticated defenses, according to a new report from Symantec.
A poker software developer plans to implement a fix this week for a vulnerability recently discovered by two security researchers who analyzed one of its gambling applications.
Microsoft has amended a security update containing a patch that reportedly caused errors in some third-party software.
A review of poker applications shows that many suffer security flaws, putting players at risk of attack, according to a Malta-based security company.
A U.S. House of Representatives committee failed to make the changes necessary to allay fears about government surveillance in a controversial cyberthreat sharing bill that's moving toward a House vote, critics said.
Hackers could use vulnerable charging stations to prevent the charging of electric vehicles in a certain area, or possibly even use the vulnerabilities to cripple parts of the electricity grid, a security researcher said during the Hack in the Box co...
Thousands of wireless IP cameras connected to the Internet have serious security weaknesses that allow attackers to hijack them and alter their firmware, according to two researchers from security firm Qualys.
Bitcoin's roller-coaster price swings on Wednesday were caused by an influx of new buyers and software that couldn't keep up, according to the largest exchange, Mt. Gox.
Latest News Articles
- LTE network for US public safety taking it one step at a time
- Phone unlocking bill clears US House, next step is president's signature
- Oracle's new in-memory database option could spark unanticipated costs, expert warns
- Bose sues Beats over headphone patents
- SEC drops probe into Facebook's pre-IPO sales disclosures
Most Popular Articles
- 1 Buying guide: Ovens, cooktops and freestanding cookers (upright ranges)
- 2 What does an NBN connection look like in a new home?
- 3 Tethering tutorial: How to use your iPhone as a modem
- 4 The most disturbing YouTube videos of all time
- 5 How to connect your iPhone to your TV
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Best Deals on GoodGearGuide
- Notebooks View all »
- $105.91 free shipping
- 44% off $550 free shipping
- $143 free shipping
- Tablets View all »
- Mobile Phones View all »
- TVs View all »
- Digital Cameras View all »