A U.S. House of Representatives committee failed to make the changes necessary to allay fears about government surveillance in a controversial cyberthreat sharing bill that's moving toward a House vote, critics said.
A feature in the Twitter API (application programming interface) can be abused by attackers to launch credible social engineering attacks that would give them a high chance of hijacking user accounts, a mobile application developer revealed Wednesday...
Hackers could use vulnerable charging stations to prevent the charging of electric vehicles in a certain area, or possibly even use the vulnerabilities to cripple parts of the electricity grid, a security researcher said during the Hack in the Box co...
“Improving users' experience” is not justification for using consumer information in Big Data projects according to Europe's top data protection officials.
The high-end Canon EOS-1D X camera can be hacked for use as a remote surveillance tool, with images remotely downloaded, erased and uploaded, a researcher said during the Hack in the Box security conference in Amsterdam on Wednesday.
Mobile phone apps are accessing users' private data and transmitting it to remote servers far more than appears strictly necessary, while users have inadequate tools to monitor or control such access, according to a new study by two French government...
Last week, Facebook released new software for Android phones called "Home." The software is a set of apps that you can download to put Facebook photos and messaging front and center on your mobile device.
Social network's new overlay for Android smartphones 'would be the first thing I would block on my network,' said one security adviser
Facebook has posted a Q&A on its website about the privacy implications of its new Facebook Home software for Android phones, though it was unclear if it has addressed all the concerns raised.
A group of U.S. lawmakers has introduced legislation that would require law enforcement agencies to get court-ordered search warrants before obtaining a suspect's mobile phone location or GPS data, instead of using prosecution-issued subpoenas.
If U.S. law enforcement agencies agree to changes in electronic surveillance law to better protect the privacy of stored email and documents, they want several changes in return, including a requirement that email and cloud service providers hold ont...
A site that published the private information and credit reports of several celebrities and other public figures last week went offline on Sunday. The last person to have his alleged private information exposed on the site was CIA director John Brenn...
Facebook quickly fixed a privacy leak in its new timeline after being alerted to the problem, according to a watchdog that follows the social-networking site closely.
New recommendations from Europe's top privacy watchdog could have big ramifications for Google Play, Apple and application developers.
Latest News Articles
- EBay faces class action suit over data breach
- LG G3 review
- Sale of Mt. Gox-related Bitcoins.com halted after court order
- Qualcomm faces hurdles collecting royalties from China
- Twitter employees mainly male and white, says it has 'lot of work to do'
Most Popular Articles
- 1 What does an NBN connection look like in a new home?
- 2 Buying guide: Ovens, cooktops and freestanding cookers (upright ranges)
- 3 The most disturbing YouTube videos of all time
- 4 Tethering tutorial: How to use your iPhone as a modem
- 5 How to connect your iPhone to your TV
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Best Deals on GoodGearGuide
- Notebooks View all »
- 25% off $792 free shipping
- Tablets View all »
- Mobile Phones View all »
- TVs View all »
- Digital Cameras View all »