Hackers never sleep, it seems. Just when you think you've battened down the hatches and fully protected yourself or your business from electronic security risks, along comes a new exploit to keep you up at night. It might be an SMS text message with ...
Siemens is working on a fix for some serious vulnerabilities recently discovered in its industrial control system products used to manage machines on the factory floor.
Hold on to your hat. The first of the social networking sites is about to launch its initial public offering, or IPO.
A planned presentation on security vulnerabilities in Siemens industrial control systems was pulled Wednesday over worries that the information in the talk was too dangerous to be released.
Apple could be planning to mark the 10th anniversary of the first Apple Stores opening in Virginia and California with a major product launch, according to reports.
The mobile computing technology explosion has brought out seriously organized, international and profit-driven cybercriminals.
A computer security student at New York's Rochester Institute of Technology has been arrested on charges that he posted counterfeit Internet coupons to the 4chan and Zoklet websites.
The U.S. government and the country's top mobile phone service providers on Tuesday launched a public safety program that will allow people to receive emergency alerts via text message.
Some U.S. companies may unwittingly be funding businesses in China to the tune of millions of dollars.
The CIA has declassified the six oldest documents in its secret vault revealing a host of invisible ink recipes and one way to open sealed envelopes without being caught.
If there's a lesson to be learned from last year's Stuxnet worm, it's that the private sector needs to be able to respond quickly to cyber-emergencies, the head of the U.S. Department of Homeland Security said Monday.
You know an industry has reached critical mass when vendors start developing software for it, and that time has come for medical marijuana.
BOSTON -- Financial services firms are now using social media to get customers involved in online discussion forums, advertise services and monitor what's being said about their businesses.
One day after a hacker posted screen shots and data to a hacking mailing list, saying he had broken into a New Mexico wind turbine facility, the company that runs the turbines says it has seen no evidence of a computer intrusion.
Seems that the recent Epsilon breach has rankled a couple members of the U.S. Senate who are now pushing for further investigation into the irritating violation of privacy.
Most Popular Reviews
- 1 Microsoft Surface Pro 3 Windows 8.1 tablet
- 2 Samsung Galaxy Tab S (10.5) 4G review
- 3 TomTom Runner Cardio GPS watch
- 4 LG G3 review
- 5 Nokia Lumia 930 review
Best Deals on GoodGearGuide
Latest News Articles
- Apple rolls out iOS 8 to Australian iPhones, iPads today
- The kill switch is here: iOS 8 enables it by default
- Reports of another wave of layoffs rekindle bad press for Microsoft
- AT&T to put service setup in enterprise customers' hands
- Scary video highlights danger of damaged Lithium Ion batteries
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.