Microsoft today said it will ship 13 security updates next week to patch 22 vulnerabilities in Internet Explorer, Windows, Visio and Visual Studio.
The night before the start of this week's Black Hat hacker conference here in Las Vegas, security researcher Dillon Beresford gave a demonstration to a small audience in his room at Caesar's Palace. The topic: how a hacker could take over the Siemens...
The best way to protect business information on smartphones from cybercriminals is to leave that information off smartphones, according to a mobile security expert.
A total of 117 Indian government websites were defaced by hackers from January to June this year, prompting the government to take additional security measures, a federal minister told Parliament.
Soon, SAP hopes to sew up a gaping security hole for its 7,000 iPad-toting employees. The Germany-based tech giant is beta testing a product that will allow it to send PGP-encrypted confidential email to employees. In turn, employees will be able to ...
Using data collected from its Mobile Threat Network, Lookout today released a full report on the state of mobile malware and security. The report covers both Android and iOS, and compares the risks that both platforms face. You can view and download ...
According to some headlines, the sky is falling on Android. No, I am not referring to the headlines predicting that the iPhone 5 will double Apple's smartphone market share and leave Android in its dust. I am referring to reports that a new Trojan ha...
McAfee today published a report that tells how it discovered evidence in a server on the Internet of stealthy intrusions, probably by an unnamed "nation-state," into 72 businesses and government agencies since 2006. The goal, says McAfee, is to steal...
Every company in every conceivable industry is compromised by hackers - or will be shortly - according to a report from McAfee, a major maker of cybersecurity software.
LAS VEGAS --Warnings about emerging cyberthreats shouldn't be treated with the same skepticism that many government officials showed toward the alarms sounded prior to the Sept. 11, 2001, terrorist attacks, warned a leading counter-terrorism at the B...
Microsoft today launched a $250,000 contest for researchers who develop defensive security technologies that deal with entire classes of exploits.
Security product provider Rapid7 has updated its widely used open-source Metasploit exploitation framework, expanding the software so it supports enterprise IT security staff as well as its core audience of penetration testers.
When hackers broke into Google's computer network nearly two years ago, their first step was to take over Microsoft Windows machines running in the company's China offices. Would Google have been better off had those workers been running the Mac?
Affiliates of the American Civil Liberties Union (ACLU) in 31 states have filed 379 information requests, demanding that state and local law enforcement agencies tell how they use location information from mobile phones to track U.S. residents.
Hacker groups such as Anonymous and Lulz Security may need to be monitored more closely in the event they are assisted by other hackers with higher skill levels and decide to strike critical infrastructure.
Most Popular Reviews
- 1 Motorola Moto X (2nd Gen) review: Raising the bar
- 2 Xiaomi Mi4 review: Xiaomi's best yet
- 3 Samsung Galaxy Note Edge review: Lightly flawed, Undeniably special
- 4 Sony Xperia Z3 review: The no-frills flagship
- 5 Samsung's Galaxy Alpha review: A peek into the Galaxy S6
Best Deals on GoodGearGuide
Latest News Articles
- Canon PIXMA MG7560 All-In-One Cloud printer
- Telstra Wi-Fi 4G Advanced II wireless modem review
- Facebook tests delivering tips about your location
- How three small credit card transactions could reveal your identity
- Citrix's 900 job cuts seen as 'defensive' move
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.