Explosive revelations in the past six months about the U.S. government's massive cyber-spying activities have spooked individuals, rankled politicians and enraged privacy watchdogs, but top IT executives aren't panicking -- yet.
New attack campaigns have infected point-of-sale (PoS) systems around the world with sophisticated malware designed to steal payment card and transaction data.
Two million logins and passwords from services such as Facebook, Google and Twitter have been found on a Netherlands-based server, part of a large botnet using controller software nicknamed "Pony."
In a development likely to concern those who believe that a system that's not connected to a network is safe from surveillance, researchers have demonstrated that microphones and speakers built into laptops can be used to covertly transmit and receiv...
Attackers are exploiting a new and unpatched vulnerability in Windows XP and Windows Server 2003 that allows them to execute code with higher privileges than they have access to.
A new worm is targeting x86 computers running Linux and PHP, and variants may also pose a threat to devices such as home routers and set-top boxes based on other chip architectures.
A new Trojan program that targets users of online financial services has the potential to spread very quickly over the next few months, security researchers warn.
A new malicious software program, advertised for sale on underground forums, claims to mine and steal bitcoins, according to a Danish security company.
Cybercriminals are increasingly using the "Blackshades" malware program whose source code was leaked three years ago, according to an analysis by Symantec.
The U.S. National Security Agency reportedly hacked into over 50,000 computer networks around the world as part of its global intelligence gathering efforts, and also taps into large fiber optic cables that transport Internet traffic between continen...
A new financial malware program that communicates with attackers over the I2P (Invisible Internet Project) anonymity network is for sale on a Russian cybercrime forum.
A recently discovered malicious program steals log-in passwords and other sensitive information from SAP client applications and allows cybercriminals to access SAP servers from infected workstations.
A worm-like type of malicious software has been found targeting Apache Tomcat, an open-source Web server application, according to Symantec.
The creators of a Web-based attack tool called Angler Exploit Kit have added an exploit for a known vulnerability in Microsoft's Silverlight browser plug-in to the tool's arsenal.
Malicious software aimed at stealing online banking credentials surged in the third quarter of this year to a level not seen since 2002, according to a new report from Trend Micro.
Most Popular Reviews
- 1 LG 65-inch UHD TV (65UF950T) review
- 2 Playing chicken with a Tesla Model S
- 3 Audi TT (2015) review: A smarter take on the sports coupe
- 4 Microsoft Lumia 640 review: Honouring Nokia's legacy
- 5 Apple Watch review: saving time
Join the Good Gear Guide newsletter!
Deals on Good Gear Guide
- Networking, Wireless & VoIP
Deals on Good Gear Guide
Latest News Articles
- GoPro Hero4 Session: half the size and waterproof to 10 metres
- The Upload: Your tech news briefing for Monday, July 6
- Leak of ZeusVM malware building tool might cause botnet surge
- Giant mecha robots from Japan, US will meet in epic battle
- Italian surveillance software maker, Hacking Team, allegedly breached
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.