After 11 rounds of international negotiations, the final text of the controversial Anti-Counterfeiting Trade Agreement (ACTA) has overcome its biggest hurdle yet when it was welcomed as a step in the right direction by the European Parliament, which ...
Google has begun testing an intriguing plugin for Microsoft Office. Google Cloud Connect is a devastatingly simple concept: rather than save your files to your computer's hard disk, it allows you to save them to your online Google Docs space.
Enterprise software provider SAP is stepping up its security stance as its once-isolated systems become increasingly connected to the Internet, posing new risks as hackers diversify their targets.
Apple has finally released the highly-anticipated iOS 4.2. While the attention around iOS 4.2 has been focused on the enhancements and new features -- particularly for the iPad, the update also fixes more than 80 vulnerabilities in the iPhone, iPod, ...
With its pending US$2.2 billion purchase of Novell, Attachmate is acquiring a rich portfolio of technologies. The next step will be actually putting these riches to work, analysts said Monday.
Apple today patched 27 vulnerabilities in Safari for Mac OS X and Windows, 85 per cent of them critical bugs that could be exploited to hijack Macs or PCs.
Microsoft on Wednesday patched an enterprise security tool that had blocked some copies of Chrome from updating.
China's largest fixed-line phone carrier has denied it hijacked worldwide Internet traffic this past April following a U.S. government report that said the company had redirected network routes through Chinese servers.
One in five employees is putting their company's network atrisk by using non-standard smartphones in breach of their organisation's security policy.
McAfee today revealed its McAfee Threat Report for the third quarter of 2010. Information like that provided by McAfee in these quarterly reports is valuable for IT admins -- enabling them to keep a finger on the pulse of malware, and to stay in touc...
Passwords are the predominant means of securing sensitive data, and that is why there are established best practices defining password policies. Sadly, though -- the most critical data is often less secure because Admin passwords function outside of ...
Dell Wednesday announced its first endpoint encryption product, along with the possibility of factory installation on certain Dell PCs.
Microsoft doesn't earn billions of dollars every month by giving away its software. But even Microsoft is no stranger to offering freebies in a bid to increase customer loyalty.
After over 10 years of active participation in the honeypot community, I was surprised not to have heard of MicroSolved's HoneyPoint Security Server before I started planning this roundup. HoneyPoint runs on Windows, Linux, and Mac OS X, and offers s...
Latest News Articles
- Could Bitcoin's frothy venture funding dry up?
- AT&T to report on government requests for user data
- Alcatel sells federal technology unit for US$200 million
- Wall Street Beat: Economic growth, software news and BlackBerry deal boost tech stocks
- NSA defends foreign surveillance after new reports of targets
Most Popular Articles
- 1 Portable Air Conditioners
- 2 How to update your Samsung Galaxy S4 to Android 4.3 Google Edition
- 3 Tethering tutorial: How to use your iPhone as a modem
- 4 Capacitive vs resistive touchscreens
- 5 LCD vs plasma vs LED TVs buying guide
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Best Deals on GoodGearGuide
Best Deals on PCWorld
- TabletsView all »
- NotebooksView all »
- Mobile PhonesView all »
- Printers & ScannersView all »
- Networking, Wireless & VoIPView all »