An all-in-one security suite that puts a focus on parental features and safe social networking
Dropcam Echo review: A live streaming camera and app that are easy to set up and access
Avira AntiVir Personal review: Great malware protection
BitDefender Antivirus Pro 2011 offers good detection of known malware
Avast Free Antivirus 5 review: This free antivirus package offers quick scan speeds
Since 2011 a group of attackers has been targeting companies that operate industrial control systems with a backdoor program called BlackEnergy.
The number of personal records compromised by data breaches in California surged to 18.5 million in 2013, up more than six times from the year before, according to a report published on Tuesday by the state's Attorney General.
security in pictures
From televisions to passenger planes, even the most unassuming device can, if accessed by the wrong people, be turned into something more sinister.
These disgruntled employees show what can happen when an employer wrongs them.
It's not just your boss or the government that's spying on you, it's also the devices and technologies you embrace.
Here are 10 of the creepiest mobile apps, some of which are still available for download
Google is applying a surveying technique from the 1960s to a project that aims to collect data about users' computers without potentially compromising their privacy.
The critical Shellshock vulnerabilities found last month in the Bash Unix shell have motivated security researchers to search for similar flaws in old, but widely used, command-line utilities.
Users of Drupal, one of the most popular content management systems, should consider their sites compromised if they didn't immediately apply a security patch released on Oct. 15.
The German government is calling for the EU-wide retention of personal flight data as an anti-terrorism measure, but is facing opponents who object to yet another database holding private information.
Facebook has released an open-source tool for monitoring operating system state changes across very large infrastructures, which could help engineers quickly diagnose performance and security issues.
FreeOTFE may sound like a political bumper sticker, but it stands for "Free On The Fly Encryption." The "Free" part is self-explanatory; "On The Fly Encryption" refers to the encrypting/decrypting of data as it is written to or read from your hard di...
Many reasons exist for why you might want or need to "security wipe" a BlackBerry, or completely erase all personal data stored on your handheld: You got a new smartphone and plan to retire the older device; you're trading in your existing BlackBerry...
Today is the final Microsoft Patch Tuesday for 2010. It has been a busy year for Microsoft when it comes to security bulletins, and December is no exception as Microsoft closes out the year with a record 17 security bulletins. With only a week or so ...
A security researcher today provided a way for users to see whether their e-mail addresses and passwords were among the 1.3 million compromised in a hack of Gawker Media's sites.
Despite the convenience, free public Wi-Fi networks like those found in hotels, Starbucks, and McDonald's are also a serious risk when it comes to your data and personal information.
As tech companies increasingly rely on analyzing and selling user data to boost revenue, trust is emerging as one of the defining issues of the year for the IT sector.
After six months of contentious debate over U.S. National Security Agency surveillance programs, prompted by leaks from former government contractor Edward Snowden, the third week in December may have marked a major turning point.
Earlier in September, an update to the Google Settings app for Android tipped off that a remote device lock and password reset feature was on its way to the Android Device Manager. This week, the service finally went live for most users through the A...
Police in Austin, Texas, set up sting operations with cars they have under surveillance, watching for thieves to break into them. Marcus J. Carey's Web service, HoneyDocs -- born in the same city -- uses the same concept, only with computer files.
It's tough to keep track of all of your passwords. In spite of advances in biometrics, and increased attention on the value of two-factor authentication, passwords remain the primary means of digital security. They're also one of the weakest links in...
Whitepapers about security
A data security breach is every organisation’s worst nightmare. It impacts the relationship with your employees, erodes the trust with your customers and threatens your organisation’s reputation
Most Popular Reviews
- 1 Nokia Lumia 830 review: Punching above its weight
- 2 BlackBerry Passport review: A smartphone going nowhere
- 3 Sony Xperia Z3 Compact review: A flagship at 4.6-inches
- 4 Bose QuietComfort 25 review: A traveller's companion
- 5 Microsoft Surface Pro 3 Windows 8.1 tablet
Best Deals on GoodGearGuide
Latest News Articles
- Sharp smartband LCD uses 1,000 times less power
- Hungary ditches Internet tax plans after protests
- Sony's new mobile chief has hands full as handsets struggle
- IBM joins Tencent to target China's growing enterprise cloud market
- Samsung attacks Chinese rivals with new mid-range Galaxy phones
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
- FTStudio Design ManagerVIC
- FTDigital Account ExecutiveNSW
- FTAccount ExecutiveNSW
- FTChief Information Officer - CSIROACT
- FTBusiness ManagerNSW
- FTPartner Marketing Communications Manager - Leading Global Tech BrandNSW
- FTDigital PR SpecialistNSW
- FTMarketing Communications Operations Manager - Global Tech Market leaderNSW
- CCWeb / Mobile Developer - Magento - HTML5, CSS - Excellent CMS SkillsNSW
- FTBusiness development manager - retargettingNSW
- CCStrategic Partner ManagerNSW
- FTMarketing Solutions ManagerNSW