Security researchers from Damballa have found a new variant of the Pushdo malware that's better at hiding its malicious network traffic and is more resilient to coordinated takedown efforts.
Internet traffic in and out of war-torn Syria has been restored after a disruption of nearly eight and a half hours, according to Internet traffic charts.
Russia on Wednesday took a step toward protecting private data by ratifying the so-called Convention 108, established in 1981 and legally binding in 45 countries.
Security researchers from Russian cybercrime investigations firm Group-IB have uncovered a cyberfraud operation that uses specialized financial malware to target the customers of several major Australian banks.
Just 11 days after issuing an advisory, Microsoft has released a patch for a bug in Internet Explorer 8 that bedeviled the U.S. Department of Labor earlier this month.
Adobe has released scheduled security updates for its Reader, Acrobat, Flash Player and ColdFusion products on Tuesday in order to fix many critical vulnerabilities, including one that is already actively exploited by attackers.
The Android threat landscape is growing in both size and complexity with cybercriminals adopting new distribution methods and building Android-focused malware services, according to a report from Finnish security vendor F-Secure.
China's reputation for security may have been marred by recent U.S. accusations of state-sponsored hacking but the nation is still a safe place as a tech subcontractor for foreign businesses, according to one of China's largest IT outsourcing vendors...
Intel is introducing new ideas to secure the public cloud, offering a service in which online files can be accessed after users are verified by an authentication scheme including face and voice recognition.
Hackers are finding it pays to call ahead before sending malware-laden email.
Mobile security vendor Lookout plans to start flagging as adware mobile apps that use aggressive ad networks if they don't obtain explicit consent from users before engaging in behavior that potentially invades privacy.
Kim Dotcom has ordered the removal from his Mega file-storage service design plans for a controversial one-bullet plastic gun.
Colleges and universities are being encouraged to scrutinize their systems to keep them from being hijacked in DDoS (distributed denial-of-service) attacks.
A vast debit card fraud scheme that allegedly netted $US45 million has been linked to the hacking of credit card processors in the US and India.
Hackers who commandeered The Onion's Twitter account used simple but effective phishing attacks to obtain passwords, according to a writeup by the publisher's technology team.
Most Popular Reviews
- 1 LG 65-inch UHD TV (65UF950T) review
- 2 Playing chicken with a Tesla Model S
- 3 Audi TT (2015) review: A smarter take on the sports coupe
- 4 Microsoft Lumia 640 review: Honouring Nokia's legacy
- 5 Apple Watch review: saving time
Join the Good Gear Guide newsletter!
Deals on Good Gear Guide
- Networking, Wireless & VoIP
Deals on Good Gear Guide
Latest News Articles
- The Upload: Your tech news briefing for Tuesday, July 7
- OpenSSL tells users to prepare for a high severity flaw
- Nvidia attempts to ease the path to deep learning
- FBI chief warns that terrorists hide behind encrypted communications
- Privacy group files FTC complaint to push Google to extend right to be forgotten to US
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
- FTPR & Corporate Affairs ManagerNSW
- FTTechnical Sales Support Representative - The Worlds largest Search Engine!NSW
- CCSenior Drupal DeveloperNSW
- CCDrupal DeveloperNSW
- FTMedia and Communications AdvisorACT
- CCInternal Communications ExecutiveNSW
- FTAccount Manager - PR AgencyNSW
- FTSenior Account Manager - PR AgencyNSW
- CCInternal Communications AdvisorNSW