When the popular Web site Gawker was hacked into recently, more than a million user IDs and passwords were released. If you were one of the people compromised that's annoying -- very annoying. Not that it's a big deal that someone could log into a go...
Depending on whom you ask, paying for antivirus software is either a good investment or a total ripoff. In reality, neither viewpoint is accurate. You can find plenty of good reasons to choose a paid antivirus product, and plenty of good reasons to ...
If YouTube started as a place for people to upload low-res videos, Google's global 2010 'most popular' video list shows just how fast the model is evolving into something nakedly commercial.
This end-of-year article is a looking forward one -- looking forward to a year in which the Internet will be under a multi-pronged attack that threatens to change it irrevocably in ways that may destroy much of the Internet's potential.
It's been All WikiLeaks, All the Time here in Cringeville lately. And why not? As I noted last time out, this is the biggest thing to hit the WebberNets since Tim Berners Lee dreamed it up 20 years ago. We're still unraveling the implications and pro...
In recent weeks WikiLeaks has been targeted by denial-of-service (DoS) attacks, had its hosting service shutdown, been bounced off of Amazon hosting, had its funding through PayPal, MasterCard and other sources shut down, and its leader arrested on s...
Perhaps you've heard that the Apple Mac OS X operating system is simply more secure by design and not prone to the security flaws and vulnerabilities that plague the dominant Microsoft Windows operating system? Well, don't believe the hype. Apple unl...
Virtualizing x86 infrastructure isn't just a one-step process -- as servers change, the whole data center must change as well. While server hypervisors such as VMware's ESX, Microsoft's Hyper-V and Xen can make IT more efficient and cost-effective, m...
It's unlike any conference badge you've seen before. Sleek, stylish, programmable, and made out of metal. It's the Defcon 18 conference badge. Unveiled at the annual hacker conference in Las Vegas, here's a first look at this year's badge.
Businesses are eyeing a transition to Microsoft Windows 7, and with a wealth of security features that are part of it, it's worth figuring out the good and bad about each of them, says Gartner analyst Neil MacDonald, who notes in some cases, third-pa...
While apologies from BP to the world regarding its environmental disaster and even from a U.S. Congressman to BP have stolen headlines of late, the tech industry has not been without its fair share of apologies during the first half of 2010 either.
In May, Web security consultant George Deglin discovered a cross-site scripting (XSS) exploit that involved Facebook's controversial Instant Personalization feature. The exploit ran on Yelp, one of the three sites that Facebook had selected to test I...
Who's got the safest operating system? Apple, Google, Microsoft? According to one security expert, what really matters is who's using the OS.
The continuing saga of Google's wireless snooping and the maelstrom it's generated won't end anytime soon.
Whatever you use to surf the Web needs a fix. Developers of all five major browsers--Chrome, Firefox, Internet Explorer, Safari, and Opera--recently released important security patches.
Most Popular Reviews
- 1 2016 Ford Mustang EcoBoost review
- 2 Synology DS216+ Review
- 3 Review: TCL C1 series 4K TV
- 4 Sony 75-inch UHD TV (X9400C) review: Sony and Android are a winning duo
- 5 LG 55EG960T OLED UHD TV
Join the Good Gear Guide newsletter!
Best Deals on Good Gear Guide
Latest News Articles
- Sony Xperia X Performance review: Sony’s most disappointing product in years
- 802.11ac Wi-Fi gear driving strong WLAN equipment sales
- Microsoft declares 350M devices now on Windows 10
- Facebook chooses friends and family over celebrities in your feed, which is probably healthy
- Florida man sues Apple for $10 billion for 'stealing' his iPhone invention from 1992
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
- CCSolution Architect / Designer - Cyber SecurityNSW
- FTTechnical Services ManagerACT
- FTService Delivery Coordinator - ApplicationsNSW
- CCContract Analyst Programmer (JAVA/SQL) 160629/AP/793Asia
- CCBusiness Analyst, InsuranceNSW
- FTTechnical Consultant - ServerSA
- CCSharePoint Consultant - Office 365NSW
- CCProject/ Program AnalystVIC
- FTEnvironments Lead (Linux/ Automation)VIC
- CCAgile Product Manager/ UX, Web, Digital Project ManagerNSW
- FTDatabase DeveloperACT
- FTSystems EngineerNSW
- FTUX DesignerVIC
- FTOracle Fusion Implementation ConsultantNSW
- CCITSM ConsultantNSW
- CCTibco DeveloperWA
- CCx2 AEM Frontend/UI DevelopersVIC
- CCContract Junior Programmer (JAVA / SQL) 160621/JP/224Asia
- CCSr Business Analyst FI/CO, ERP, Procurement, Payroll, HR, SAPNSW
- FTSenior Business Analyst - Enterprise DataNSW
- CCSystems Engineer | Experimental military technology | NV1ACT
- FTNV2 Defence Project Manager | Canberra | Major exciting White Paper projectsACT
- CCContract IT Assistant (IT Security/IT Audit) 160621/ITA/361Asia
- CCContract Programmer (IT Security/Website Admin) 160617/P/564Asia