WikiLeaks' founder Julian Assange told an Indian TV channel that the Indian Prime Minister Manmohan Singh was engaged in a deliberate attempt to mislead the public by suggesting that the veracity of cables between the U.S. government and its embassy ...
A former high school senior from Orange County, California, has pleaded guilty to charges that he installed spyware on school computers in order to boost his grades.
Data breaches cost UK businesses more than ever last year, with most of the financial hit resulting from lost business in the aftermath of an incident, a Ponemon Institute survey for Symantec has found.
Adobe is releasing updates today to address a <a href="http://www.pcworld.com/businesscenter/article/222098/adobe_flash_hit_with_zeroday_exploit.html">critical zero-day flaw</a> in Flash Player--and the authplay.dll element used in Adobe Reader and A...
Adobe Monday patched a critical vulnerability in Adobe Reader, making good on a promise last week to plug the hole.
A Texas man was charged Monday by the U.S. Department of Justice with helping to inflate the prices of penny stock companies by promoting them with a spam-spewing botnet of hacked computers.
A U.S. appeals court has reinstated a lawsuit, brought by civil liberties and other groups, challenging the legality of a controversial government law allowing the surveillance of residents' telephone calls and e-mail messages.
Google must pay a fine of €100,000 ($US142,000) for the unauthorized collection of information about the location of Wi-Fi hotspots in France by its Street View cars, France's National Commission on Computing and Liberty (CNIL) has ordered.
The Rustock botnet--one of the most prolific sources of spam -- has gone silent. Microsoft worked with security vendors and the civil court system to pull the plug on Rustock. Some security experts question, though, if the absence of Rustock will hav...
With the theft of sensitive data about RSA's SecurID technology, large businesses should reassess the risks to the assets the two-factor authentication deployment is supposed to protect, a risk management expert advises.
Microsoft yesterday urged users of older Office suites to install and run a complicated tool to protect themselves against ongoing attacks exploiting an unpatched bug in Adobe's Flash Player.
It's no secret that the goal of modern malware writers is to create attack software that is stealthy and flows undetected for as long a period of time as possible. What's increasingly startling, however, is how pervasive custom malware has become as ...
Security firm Sophos is warning that a new scam is spreading virally on Twitter, and that a significant number of people have already fallen for it.
Something like this has happened to all of us lately: You shop for a watch for a friend's birthday and for a week afterwards every site you visit features ads for watches. It seems like everyone from Google on down is tracking where we go and what we...
The relatively scant information released by EMC's RSA security group on Thursday in connection with the theft of SecurID authentication technology code is fueling considerable speculation about the nature of the breach and its impact on enterprises.
Most Popular Reviews
- 1 Samsung Galaxy Tab S: hands-on with Samsung's 2014 flagship tablet
- 2 Fetch TV set-top box
- 3 Dell Inspiron 15 5547 laptop
- 4 Samsung NX30 camera
- 5 ASUS T100 Transformer Book hybrid
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Latest News Articles
- Microsoft security tool EMET 5.0 puts a leash on plugins
- Some are twisting the facts in requests to be forgotten, Google says
- Almost 200,000 people may have been affected by US visa system crash
- Who wins if Iliad buys T-Mobile?
- Most USB thumb drives can be reprogrammed to silently infect computers
Best Deals on GoodGearGuide
- Notebooks View all »
- 60% off $12.99
- 76% off $5.98
- Tablets View all »
- Mobile Phones View all »
- TVs View all »
- Digital Cameras View all »