The GPRS Roaming Exchange (GRX) network, which carries roaming traffic among hundreds of mobile operators worldwide, contains Internet-reachable hosts that run vulnerable and unnecessary services, recent security scans reveal.
The Secure Boot security mechanism of the Unified Extensible Firmware Interface (UEFI) can be bypassed on around half of computers that have the feature enabled in order to install bootkits, according to a security researcher.
An Adobe Flash player vulnerability is being used in attacks on a massive scale against Web users, mostly in Japan, to collect online banking details, according to new research from Symantec.
Inexpensive equipment can be used to disrupt vessel-tracking systems and important communications between ships and port authorities, according to two security researchers.
One of many flaws in a call recording tool used by law enforcement could let a hacker remotely steal audio recordings, according to a security consultancy, which recommended companies not use the software until it's fixed.
A security researcher who found a major vulnerability in eBay's website last week said a second flaw he found hasn't been fixed and could be used to hijack user accounts.
Attackers are increasingly abusing devices configured to publicly respond to SNMP (Simple Network Management Protocol) requests over the Internet to amplify distributed denial-of-service attacks.
Microsoft said Thursday it plans eventually to patch a vulnerability in Internet Explorer 8 that it's known about for seven months, but it didn't say when.
Apple released new versions of Safari for Mac OS X to fix critical vulnerabilities that could allow Web attackers to execute malicious code on computers. Patches are not yet available for Apple's iOS mobile OS, which is likely affected by some of the...
An older version of Microsoft's Internet Explorer browser has an unpatched software flaw that could allow rogue code to run on a computer, the second such flaw found in a month.
DuckDuckGo, the privacy-themed search engine, has received a major redesign with enhanced search tools that could usher in a wave of new users.
Microsoft Silverlight vulnerabilities are increasingly being exploited in drive-by download attacks to infect computers with malware, especially through malicious ads.
The U.S. Department of Justice's decision to bring computer hacking and economic espionage charges against five alleged members of the Chinese army is an attempt by President Barack Obama's administration to redirect a global discussion about cyberha...
The U.S. Department of Justice has charged five supposed members of the Chinese People's Liberation Army with hacking into computers and stealing trade secrets from six U.S. organizations in the nuclear power, steel and solar industries, the agency a...
Further investigation into an exploit kit known as "Elderwood" shows the attackers using it are more numerous and possibly better funded than previously thought, according to new research from Symantec.
Most Popular Reviews
- 1 Microsoft Surface Pro 3 Windows 8.1 tablet
- 2 Samsung Galaxy Tab S (10.5) 4G review
- 3 TomTom Runner Cardio GPS watch
- 4 LG G3 review
- 5 Nokia Lumia 930 review
Best Deals on GoodGearGuide
Latest News Articles
- Intel pushes factory IoT with $9 million cost savings at plant
- Malware program targets Hong Kong protesters using Apple devices
- Google triples bug bounty reward range to $15,000
- Ellison pushes Oracle's new Cloud platform hard, but questions linger
- Shellshock flaw could pose risks to payments industry
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.