The TOR Project is advising that people stop using Windows after the discovery of a startling vulnerability in Firefox that undermined the main advantages of the privacy-centered network.
The Windows 8 Secure Boot mechanism can be bypassed on PCs from certain manufacturers because of oversights in how those vendors implemented the Unified Extensible Firmware Interface (UEFI) specification, according to a team of security researchers.
Bitdefender has released a Windows application designed to help users secure sensitive Web-browsing sessions, especially when they shop or bank online. The application is called Safepay and a free version is available to home users.
Microsoft estimates that 88 percent of botnets running the Citadel financial malware were disrupted as a result of a takedown operation launched by the company in collaboration with the FBI and partners in technology and financial services. The opera...
Malware writers are increasingly considering the Tor anonymity network as an option for hiding the real location of their command-and-control (C&C) servers, according to researchers from security firm ESET.
Citadel malware is installed on over 20,000 PCs in Japan and actively sending financial information it harvests to servers abroad, according to security software vendor Trend Micro.
An increasing number of Android phones are infected with mobile malware programs that are able to turn the handsets into spying devices, according to a report from Kindsight Security Labs, a subsidiary of telecommunications equipment vendor Alcatel-L...
Despite the significant Java security improvements made by Oracle during the past six months, Java vulnerabilities continue to represent a major security risk for organizations because most of them have outdated versions of the software installed on ...
More fixes are appearing for a pair of highly dangerous vulnerabilities exposed earlier this month in the Android mobile operating system.
A new piece of digitally signed spyware for Mac OS X uses a special Unicode character in its file name to hide its real file extension from users and trick them into installing it.
Several underground marketplaces are offering full information packages for sale that contain verified health insurance credentials, bank account numbers, Social Security numbers and other personal information, along with counterfeit physical documen...
Trend Micro says it detected a targeted attack that sent malware-laden emails to representatives of 16 European countries and some Asian governments.
A new version of a file-infecting malware program that's being distributed through drive-by download attacks is also capable of stealing FTP (File Transfer Protocol) credentials, according to security researchers from antivirus firm Trend Micro.
A second vulnerability that can be exploited to modify legitimate Android apps without breaking their digital signatures has been identified and publicly documented.
Paying rewards to independent security researchers for finding software problems is a vastly better investment than hiring employees to do the same work, according to researchers from the University of California Berkeley.
Most Popular Reviews
- 1 Microsoft Surface Pro 3 Windows 8.1 tablet
- 2 Samsung Galaxy Tab S (10.5) 4G review
- 3 TomTom Runner Cardio GPS watch
- 4 LG G3 review
- 5 Nokia Lumia 930 review
Best Deals on GoodGearGuide
Latest News Articles
- How hackers accidentally sold a pre-release XBox One to the FBI
- Google shakes up cloud services market with another price cut
- Motorola Moto X (2nd Gen): Hands on with Motorola's bold flagship
- Twitter invests in MIT lab focused on online social movements
- Cisco and Netgear line up behind new Helix 64-bit ARM chips
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.