In its recent annual security report, Cisco predicted VOIP abuse as a potential area for cyber crime growth.
Published figures estimating the size and scope of botnets are often inaccurate and do not reflect the threat these compromised networks pose to security, according to research released this week by ENISA, the European Network and Information Securit...
My colleague, Bill Brenner, has a t-shirt he likes to wear that basically says social networking feeds the darker sides of human nature. The shirt is a parody of a Venn Diagram and shows the relationship between sites like Facebook and Twitter to wha...
Intel will use assets acquired from McAfee to provide cloud security services to protect the growing number of mobile devices that face malware and cyberattack threats.
A company that builds tools to give greater privacy online released a free browser extension on Tuesday that lets users selectively decide which websites they will allow to track them.
USANomad asked the Answer Line forum if people can eavesdrop on Voice Over Internet Protocol (VOID) phone calls.
The group of online activists known as "Anonymous" has released a batch of e-mail concerning Bank of America that was given to the group by a whistleblower who worked for a related mortgage and vehicle loan insurer.
An Internet Explorer flaw made public by a Google security researcher two months ago is now being used in online attacks.
The U.S. Federal Trade Commission has closed the book on its legal action against Twitter, stemming from <a href="http://www.pcworld.com/businesscenter/article/164182/hacker_i_broke_into_twitter.html">two 2009 hacking incidents</a> where high-profile...
The Black Hat Europe conference in Barcelona next week will feature a keynote on cyberwar from Bruce Schneier, and presentations on security flaws in Apple's Mac OS X and SAP's business software.
The CEO of mobile payment service startup Square called accusations that the company was distributing credit-card skimming devices inaccurate and unfair.
About 300 years ago, the English playwright William Congreve wrote, "music has charms to soothe a savage breast, to soften rocks, or bend a knotted oak." This week we learned that it can also help hackers break into your car.
Online malicious activity was a major headache in 2010, and so far, 2011 is no different: We've seen scams and malware on Twitter, Facebook, and the Android Market, as well as a rise in politically motivated online attacks. But that's no surprise to ...
Anti-corporate campaigners have embarrassed phone giant Vodafone, gaining access to blog accounts run by the company to post copy critical of its claimed policies on UK tax.
Google has pre-empted the forthcoming Firefox 4 and IE 9 with a new version of Chrome offering users a battery of tweaks including faster apps, interface improvements and better security.
Latest News Articles
- LG notches record smartphone shipments on G3 strength
- EBay faces class action suit over data breach
- LG G3 review
- Sale of Mt. Gox-related Bitcoins.com halted after court order
- Qualcomm faces hurdles collecting royalties from China
Most Popular Articles
- 1 What does an NBN connection look like in a new home?
- 2 Buying guide: Ovens, cooktops and freestanding cookers (upright ranges)
- 3 The most disturbing YouTube videos of all time
- 4 Tethering tutorial: How to use your iPhone as a modem
- 5 How to connect your iPhone to your TV
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Best Deals on GoodGearGuide
- Notebooks View all »
- 33% off $19.95
- $139.01 free shipping
- Tablets View all »
- Mobile Phones View all »
- TVs View all »
- Digital Cameras View all »