An all-in-one security suite that puts a focus on parental features and safe social networking
Dropcam Echo review: A live streaming camera and app that are easy to set up and access
Avira AntiVir Personal review: Great malware protection
BitDefender Antivirus Pro 2011 offers good detection of known malware
Avast Free Antivirus 5 review: This free antivirus package offers quick scan speeds
security in pictures
From electronic pills to digital tattoos, these eight innovations aim to secure systems and identities without us having to remember a password ever again
The FBI’s formidable Next Generation Identification is up and running
Options that trick you into installing potentially unwanted programs are common during the setup of free tools and programs. Here's how to spot them and keep them off your system.
Staying safe these digital days takes more than antivirus. Here are 10 fundamental things you do to protect your PC and other devices.
Small and medium-size U.S. companies should band together on cybersecurity systems as a way to pool limited resources against increasingly sophisticated attackers, the former director of the U.S. National Security Agency said Tuesday.
For the second time in as many weeks, a senior U.S. government official has warned that widespread use of encryption could harm investigations.
Four alleged members of an international computer hacking ring face charges in the U.S. of breaking into the computer networks of the U.S. Army and several tech companies and stealing several software packages, including programs used to train Army h...
Cisco Systems and Oracle are hard at work identifying networking and other products in their portfolios that are affected by the critical Shellshock vulnerability.
A privacy watchdog filed a complaint with the Federal Trade Commission against a community college district in Arizona that lost the personal data of 2.5 million students and employees in two data breaches.
FreeOTFE may sound like a political bumper sticker, but it stands for "Free On The Fly Encryption." The "Free" part is self-explanatory; "On The Fly Encryption" refers to the encrypting/decrypting of data as it is written to or read from your hard di...
Many reasons exist for why you might want or need to "security wipe" a BlackBerry, or completely erase all personal data stored on your handheld: You got a new smartphone and plan to retire the older device; you're trading in your existing BlackBerry...
Today is the final Microsoft Patch Tuesday for 2010. It has been a busy year for Microsoft when it comes to security bulletins, and December is no exception as Microsoft closes out the year with a record 17 security bulletins. With only a week or so ...
A security researcher today provided a way for users to see whether their e-mail addresses and passwords were among the 1.3 million compromised in a hack of Gawker Media's sites.
Despite the convenience, free public Wi-Fi networks like those found in hotels, Starbucks, and McDonald's are also a serious risk when it comes to your data and personal information.
As tech companies increasingly rely on analyzing and selling user data to boost revenue, trust is emerging as one of the defining issues of the year for the IT sector.
After six months of contentious debate over U.S. National Security Agency surveillance programs, prompted by leaks from former government contractor Edward Snowden, the third week in December may have marked a major turning point.
Earlier in September, an update to the Google Settings app for Android tipped off that a remote device lock and password reset feature was on its way to the Android Device Manager. This week, the service finally went live for most users through the A...
Police in Austin, Texas, set up sting operations with cars they have under surveillance, watching for thieves to break into them. Marcus J. Carey's Web service, HoneyDocs -- born in the same city -- uses the same concept, only with computer files.
It's tough to keep track of all of your passwords. In spite of advances in biometrics, and increased attention on the value of two-factor authentication, passwords remain the primary means of digital security. They're also one of the weakest links in...
Whitepapers about security
A data security breach is every organisation’s worst nightmare. It impacts the relationship with your employees, erodes the trust with your customers and threatens your organisation’s reputation
Most Popular Reviews
- 1 Microsoft Surface Pro 3 Windows 8.1 tablet
- 2 Samsung Galaxy Tab S (10.5) 4G review
- 3 TomTom Runner Cardio GPS watch
- 4 LG G3 review
- 5 Nokia Lumia 930 review
Best Deals on GoodGearGuide
Latest News Articles
- Here's what's in Asus' $2,699 Zenbook NX500 laptop
- Ex-NSA director Alexander calls for new cybersecurity model
- Eric Holder says 'worrisome' tech companies are eyeing encryption
- IPsoft seeks to grow the 'brains' of virtual assistants
- Attention enthusiasts: Windows 10 Technical Preview landing Wednesday
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.