Cybercriminals are using a new PDF exploit that bypasses the sandbox security features in Adobe Reader X and XI, in order to install banking malware on computers, according to researchers from Russian security firm Group-IB.
About 200 Android applications currently hosted on Google Play create spoofed SMS messages on the devices they are installed on, according to security researchers from antivirus vendor Symantec.
The earliest worms and viruses were created for geeky fun and did little harm - oh, how times have changed. Here are 20 worms, viruses and botnets that show the evolution of malware, from Creeper to Flame.
Some cloud providers fail to detect and block malicious traffic originating from their networks, which provides cybercriminals with an opportunity to launch attacks in a botnet-like fashion, according to a report from Australian security consultancy ...
In one of the photos, the dark-haired, bearded hacker is peering into his computer's screen, perhaps puzzled at what's happening. Minutes later, he cuts his computer's connection, realizing he has been discovered.
Security researcher Zoltan Balazs has developed a remote-controlled piece of malware that functions as a browser extension and is capable of modifying Web pages, downloading and executing files, hijacking accounts, bypassing two-factor authentication...
Many smartphone users are wondering whether their Android, Nokia and BlackBerry devices are spying on them after security researcher Trevor Eckhart recently claimed that a piece of diagnostic software on the phones was acting like malware.
A new Android Trojan program that poses as an SMS management application is sending text messages to predefined premium-rate numbers in Europe and Canada, according to security researchers from Kaspersky Lab.
Antivirus experts disagree with Chris DiBona, Google's open-source programs manager, who recently said that there is no virus problem on the Android platform and that companies selling anti-malware software for mobile operating systems are charlatans...
Smartphones and tablets are evolving from niche luxury devices to mainstream consumer gadgets. As mobile devices become a ubiquitous part of the mainstream culture, malware developers are paying attention and are anxious to exploit the fertile new te...
Researchers from security vendor F-Secure have spotted a rare malicious software sample that carried a valid code-signing certificate from a Malaysian governmental institution.
The U.S. Department of Justice is charging seven individuals with 27 counts of wire fraud and other computer-related crimes, alleging that the group hijacked four million computers across 100 countries in a sophisticated clickjacking scheme.
Security research firm NSS Labs has released an open source scanning tool that is capable of detecting all malicious drivers used by the new Duqu threat, according to its engineers. However, other security vendors believe that the malware's creators ...
Facebook's fake account detection mechanisms can be defeated 80 percent of the time with the help of automated tools, researchers from the University of British Columbia (UBC) have found after an eight-week test.
A newly identified Mac OS X Trojan bundles a component that leverages the processing power of video cards (GPUs) to generate Bitcoins, a popular type of virtual currency.
Latest News Articles
- Google to tour Europe to discuss right-to-be-forgotten ruling
- Infosys revenue and profit rise ahead of CEO change
- Samsung gives its app store a makeover with a focus on Galaxy devices
- Asus G550JK gaming notebook
- Gmail users on iOS at risk of data interception
Most Popular Articles
- 1 Buying guide: Ovens, cooktops and freestanding cookers (upright ranges)
- 2 The most disturbing YouTube videos of all time
- 3 Tethering tutorial: How to use your iPhone as a modem
- 4 How to connect your iPhone to your TV
- 5 Capacitive vs resistive touchscreens
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Best Deals on GoodGearGuide
- Notebooks View all »
- Tablets View all »
- Mobile Phones View all »
- TVs View all »
- Digital Cameras View all »