Even if your company website is secured with the latest software patches and has been tested by ethical hackers, it doesn't mean the scammers will stay away.
A weakness in XML Encryption can be exploited to decrypt sensitive information, researchers say.
Experts from security vendor ESET warn that TDL4, one of the most sophisticated pieces of malware in the world, <a href="http://blog.eset.com/2011/10/18/tdl4-rebooted">is being rewritten and improved</a> for increased resilience to antivirus detectio...
The European Union's data watchdog has attacked plans for a new Europe-wide database of alleged intellectual property infringers.
Entertainment companies seeking to trace people who are illegally file sharing may be interested in new research that could identify filesharers through their Skype accounts. A research team has figured out how to link online Skype users to their act...
Adobe is working on a fix for a Flash Player vulnerability that can be exploited via clickjacking techniques to turn on people's webcams or microphones without their knowledge.
Opera Software has released an update for its desktop browser in order to address a critical vulnerability in its handling of Scalable Vector Graphics (SVG) files, disclosed a week ago. The company denies refusing to patch the flaw when it was brough...
The Office of U.S. Trade Representative has asked the Chinese government to explain its policies related to blocking some websites in an effort to gauge the impact on U.S. small businesses operating in China, the agency said Wednesday.
The cloud-based design of Amazon's Silk browser has positive security side effects because it encrypts all traffic between users and websites, especially important when connected over unprotected Wi-Fi networks where session hijacking attacks can occ...
A Trojan used by German law enforcement authorities to intercept Internet phone calls is capable of monitoring traffic from 15 programs, including browsers and instant messaging applications.
Oracle has released a new Java security update to address multiple vulnerabilities, including one exploited during a recently disclosed attack that can allow eavesdropping on encrypted communications.
Google is rolling out over the next weeks default encryption using SSL (Secure Sockets Layer) on searches for users signing in with their accounts, the company said Tuesday.
Internet companies need to build consumer privacy and data controls into their online services to protect their brands, gain trust from their users, avoid civil lawsuits and prevent government probes, according to two regulators from the U.S. and Can...
The U.S. Congress needs to pass legislation that would require law enforcement agencies to get permission from a judge before tracking suspects through their mobile phones, instead of the now-common practice of tracking a mobile subscriber's location...
Distributed denial of service and SQL injection are the main types of attack discussed on hacking forums, according to new research from security vendor Imperva.
Most Popular Reviews
- 1 Motorola Moto X (2nd Gen) review: Raising the bar
- 2 Xiaomi Mi4 review: Xiaomi's best yet
- 3 Samsung Galaxy Note Edge review: Lightly flawed, Undeniably special
- 4 Sony Xperia Z3 review: The no-frills flagship
- 5 Samsung's Galaxy Alpha review: A peek into the Galaxy S6
Best Deals on GoodGearGuide
Latest News Articles
- Modular smartphones could be reused as computer clusters
- Adobe pushes critical Flash Player update to fix latest zero-day
- The Upload: Your tech news briefing for Monday, January 26
- Facebook privacy class action suit to kick off in April
- Coinbase set to launch licensed Bitcoin exchange in the US
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.