Someone call the malware antitrust commission: Recent versions of the Kovter ad fraud Trojan, which infects computers through Web-based exploits, close the door after themselves by updating Flash Player to the latest version.
Apple released patches for several exploits that could allow maliciously crafted applications to destroy apps that already exist on devices, access their data or hijack their traffic, but a large number of iOS devices are still vulnerable.
The developers of a mobile app called Prized that secretly mined cryptocurrencies on people's mobile phones have settled with the U.S. Federal Trade Commission after being accused of deceptive trade practices.
Just four days after Adobe Systems patched a vulnerability in Flash Player, the exploit was adopted by cybercriminals for use in large-scale attacks. This highlights the increasingly small time frame users have to deploy patches.
Companies are finding it tough to keep out new types of banking malware, which continue to get better following the bar-raising threat known as Zeus.
A computer Trojan that hides its malicious code inside PNG image files counts healthcare organizations in the U.S. among its primary targets.
Several antivirus products from security firm ESET had a critical vulnerability that was easy to exploit and could lead to a full system compromise.
Adobe Systems released an emergency security update for Flash Player Tuesday to fix a critical vulnerability that has been exploited by a China-based cyberespionage group.
A critical vulnerability is affecting 600 million Samsung devices including the company’s new flagship device, the S6.
As cybercriminals employ increasingly sophisticated tactics to steal identities and data, and the costs and consequences of data breaches skyrocket, here are seven steps that your small business should be taking to insulate themselves from cyberattac...
Windows 10 will have a new mechanism that will allow software developers to integrate their applications with whatever antimalware programs exist on users' computers.
The group behind the Duqu cyberespionage tool has compromised at least two telecommunications operators and one electronic equipment manufacturer, in addition to a cybersecurity firm and venues that hosted high-level nuclear negotiations between worl...
A state-sponsored espionage group that uses a malware platform called Duqu has compromised the computer networks of several hotels and venues that hosted negotiations over Iran's nuclear program.
Police in several European countries arrested 49 suspected members of a gang they say broke into corporate email accounts, using them to divert payments from business customers.
A new malware program designed to steal payment card details from point-of-sale (PoS) systems is targeting businesses using Oracle Micros products.
Most Popular Reviews
- 1 Playing chicken with a Tesla Model S
- 2 Audi TT (2015) review: A smarter take on the sports coupe
- 3 Microsoft Lumia 640 review: Honouring Nokia's legacy
- 4 Apple Watch review: saving time
- 5 Samsung SUHD smart TV (JS9500) review
Join the Good Gear Guide newsletter!
Deals on Good Gear Guide
- Networking, Wireless & VoIP
Deals on Good Gear Guide
Latest News Articles
- Uber throws in the towel in battle with French taxi drivers
- Android phone vendors should improve update policies, consumer organization says
- Five smartphones to look forward to
- Ad fraud Trojan updates Flash Player so that other malware can't get in
- The Upload: Your tech news briefing for Friday, July 3
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.