A pair of severe security problems in millions of SIM cards should be easy for operators to fix, according to the German security researcher who found the issues.
Hackers are now using a critical vulnerability in Android to modify legitimate smartphone applications, putting users at risk of being spied on.
An independent security researcher claimed responsibility for the security breach incident that forced Apple to close down its Developer Center website last week.
Security researchers from Polish vulnerability research firm Security Explorations claim to have identified a new vulnerability in Java 7 that could allow attackers to bypass the software's security sandbox and execute arbitrary code on the underlyin...
Cisco Systems released a security patch for its Unified Communications Manager (Unified CM) enterprise telephony product in order to mitigate an attack that could allow hackers to take full control of the systems. The company also patched denial-of-s...
The Apache Software Foundation has released Struts 220.127.116.11, a security update for its popular Java Web application development framework that addresses two vulnerabilities, including a critical one that could allow remote attackers to execute arbitr...
More fixes are appearing for a pair of highly dangerous vulnerabilities exposed earlier this month in the Android mobile operating system.
Oracle said on Tuesday that its monthly round of patches for July includes 89 fixes, 27 of which address remotely exploitable vulnerabilities in four widely used products.
Google's chances of obtaining the "http://search" domain name are shrinking after several committees affiliated with the Internet Corporation for Assigned Names and Numbers (ICANN) recently warned that dotless domain names could be harmful to the Int...
A new version of a file-infecting malware program that's being distributed through drive-by download attacks is also capable of stealing FTP (File Transfer Protocol) credentials, according to security researchers from antivirus firm Trend Micro.
Microsoft has already received several vulnerability reports that qualify for monetary rewards as part of the company's bug bounty program launched in June for the preview version of Internet Explorer 11.
Paying rewards to independent security researchers for finding software problems is a vastly better investment than hiring employees to do the same work, according to researchers from the University of California Berkeley.
Of the six critical security bulletins Microsoft issued in its Patch Tuesday monthly release of software updates, three address a vulnerability in how Microsoft software renders fonts.
Technical details and a proof-of-concept exploit have been published for a recently announced Android vulnerability that potentially affects millions of devices and allows attackers to turn legitimate apps into Trojan programs.
A noisy malware campaign against South Korea is revealing deeper secrets.
Most Popular Reviews
- 1 Sony Xperia Z3 review: The no-frills flagship
- 2 Samsung's Galaxy Alpha review: A peek into the Galaxy S6
- 3 Samsung Galaxy Note 4 review: The busiest, biggest and best Samsung phablet
- 4 Aldi's $279 Bauhn Sphere review: Disappointing
- 5 Nokia Lumia 735 review: Perfectly ordinary
Best Deals on GoodGearGuide
Latest News Articles
- MIT unifies Web development in a single, speedy new language
- Google, Microsoft, Sony make 'The Interview' available online
- Experts: FCC will adopt net neutrality rules in early 2015
- Romanian version of EU cybersecurity directive allows warrantless access to data
- Rackspace DNS recovers after DDoS brings system down
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.