Foxit Reader, a PDF viewer application often used as an alternative to the more popular Adobe Reader, contains a critical vulnerability in its browser plug-in component that can be exploited by attackers to execute arbitrary code on computers.
Digital rights and privacy advocates have welcomed Yahoo's decision to provide its users with an option to enable HTTPS (HTTP Secure) for their entire webmail sessions.
Adobe Systems warned users of its ColdFusion application server software that hackers are reportedly exploiting unpatched vulnerabilities in the product to take control of affected servers.
Turktrust, the Turkish certificate authority (CA) responsible for issuing an intermediate CA certificate that was later used to generate an unauthorized certificate for google.com, claims that the bad Google certificate was not used for dishonest pur...
The developers of Ruby on Rails, a popular Web application development framework for the Ruby programming language, released versions 3.2.10, 3.1.9, and 3.0.18 of the software on Wednesday in order to patch a serious SQL injection vulnerability.
The attackers who recently infected the website of the Council on Foreign Relations (CFR) with an exploit for an unpatched vulnerability in Internet Explorer, also targeted the website of Capstone Turbine Corporation, a U.S.-based manufacturer of gas...
Starting with version 25 of Google Chrome, browser extensions installed offline by other applications will not be enabled until users give their permission through a dialog box in the browser interface.
Cloud-based security services provider Zscaler has released an implementation for Internet Explorer of the HTTPS Everywhere browser security extension.
A recent Java 7 update allows users to completely prevent Java applications from running inside browsers or to restrict how Web-based Java content is handled by the Java Runtime Environment (JRE) client. These features will benefit security-conscious...
Google has changed the way it handles image searches so that pornographic pictures are less likely to be presented to those who aren't looking for them.
Bromium has upgraded its security platform vSentry, which uses virtualization to isolate malicious code, to protect virtual desktops and old Windows XP PCs.
A new variant of a Trojan program called Reveton that prevents victims from using their computers and displays rogue messages from law enforcement agencies is using localized voice messages to trick victims into paying made-up fines, according to res...
Security researchers have identified a botnet controlled by its creators over the Tor anonymity network. It's likely that other botnet operators will adopt this approach, according to the team from vulnerability assessment and penetration testing fir...
Twitter has restricted the ability of attackers to post tweets and perform other actions on behalf of many users who have phone numbers associated with their accounts, but some users need to enable a PIN option in order to be protected.
Mobile network operator Orange will install Lookout's Mobile Security application on some of the Android-based tablets and smartphones it distributes starting in 2013, aiming to protect millions of subscribers in the first year alone.
Latest News Articles
- LG G3 review
- Sale of Mt. Gox-related Bitcoins.com halted after court order
- Qualcomm faces hurdles collecting royalties from China
- Twitter employees mainly male and white, says it has 'lot of work to do'
- Facebook isn't giving up on search
Most Popular Articles
- 1 What does an NBN connection look like in a new home?
- 2 Buying guide: Ovens, cooktops and freestanding cookers (upright ranges)
- 3 The most disturbing YouTube videos of all time
- 4 Tethering tutorial: How to use your iPhone as a modem
- 5 How to connect your iPhone to your TV
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Best Deals on GoodGearGuide
- Notebooks View all »
- $1.50 free shipping
- $1299 free shipping
- Tablets View all »
- Mobile Phones View all »
- TVs View all »
- Digital Cameras View all »