Officials in a number of German state governments have owned up to using the Quellen-TKÜ Trojan Horse software in criminal investigations to intercept encrypted telecommunications on PCs. At least one state said it has suspended use of the software, ...
Finnish security firm Stonesoft claims to have developed 163 new attack methods that can evade network intrusion detection and prevention systems (IDPS) over multiple communication protocols including IPv4, IPv6, TCP and HTTP.
Six weeks after EMC's RSA security division saw its SecurID system hit by hackers, RSA president Tom Heiser met with the CIO of a large global medical device company.
The website of the New York Stock Exchange slowed down significantly twice on Monday afternoon, the day when the hacker group Anonymous was scheduled to launch a DDoS (distributed denial-of-service) attack on the website, according to an Internet an...
Good Technology is opening up its technology platform so that enterprises and third-party developers can build secure mobile applications running on its infrastructure.
The 4GB worth of email stolen by the LulzSec hacking group from The Sun earlier this year are sitting on a server in China, according to "Sabu," the outfit's alleged leader.
An eavesdropping tool allegedly used by the German government to intercept Skype calls is full of security problems and may violate a ruling by the country's constitutional court, according to a European hacker club.
3LM, the company founded by former Android developers and since acquired by Motorola, is making its enterprise security platform for Android phones available this week.
An electrical fire on Sunday at a data center of the New York Stock Exchange in Mahwah, New Jersey, affected communications connectivity to 58 trading firms, but the exchange expects "completely normal operations" for Monday's market open.
All the major Web-based email services have junk mail folders and spam filters that strain out obvious offenders. Categorizing messages and filtering out those you don’t want may help, but limits control. It would be nice just to tell your email prog...
YapBrowser, a replacement web browser once promoted by controversial spyware company Zango, has made a sudden return, GFI Software security researcher Chris Boyd <a href="YapBrowser, a replacement web browser once promoted by controversial spyware co...
Not only might companies have ethical, civic and legal obligations to alert authorities to cyberthreats, businesses may find that the authorities can be helpful, law enforcement agents and prosecutors said on Friday.
Prosecutors call it the biggest identity theft bust in US history. On Friday, 111 bank tellers, retail workers, waiters and alleged criminals were charged with running a credit-card-stealing organization that stole more than $US13 million in less tha...
Legal experts and law enforcement agents say new and updated laws are required to protect user privacy while allowing law enforcement to catch cybercriminals.
Data-mining programs at the U.S. Department of Homeland Security are not fully reviewed by the agency for their effectiveness and, in some cases, for their compliance with privacy protection mandates, according to a report from the U.S. Government Ac...
Most Popular Reviews
- 1 Motorola Moto X (2nd Gen) review: Raising the bar
- 2 Xiaomi Mi4 review: Xiaomi's best yet
- 3 Samsung Galaxy Note Edge review: Lightly flawed, Undeniably special
- 4 Sony Xperia Z3 review: The no-frills flagship
- 5 Samsung's Galaxy Alpha review: A peek into the Galaxy S6
Best Deals on GoodGearGuide
Latest News Articles
- Google Now adds data from Lyft, Airbnb and many more apps
- Outlook app for Android and iOS boosts Microsoft's mobile comeback
- MIT randomizes tasks to speed massive multicore processors
- NEC aims at Big Data 'sweet spot' with new SAP Hana tool
- Uber will fight to keep its Boston ride data private
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.