Microsoft now 'gets' security at every level of the organisation but the wider software industry has yet to match its zeal, the company has said in its latest Software Development Lifecycle (SDL) Progress Report.
Your personal data is out there. Every thought you tap out on Twitter, every status update you post on Facebook, and even the last credit card purchase you made is accessible via the Internet.
Users concerned with online privacy have been struggling for years to come up with a solution to being tracked on the Web. Such users either want to avoid irritating, targeted ads based on browsing history or are concerned about businesses having too...
There's hacking, then there's hacktivism. There's malware, then there's Android Trojans like the latest "threat" discovered by Symantec. Android.Walkinwat is like the Batman of mobile malware -- a rogue vigilante seeking justice through means that al...
IBM says IT staff need to pay extra attention to use of mobile devices and cloud infrastructure on business networks because both technologies are still young, and security can be sketchy.
The volume of phishing attacks dropped in 2010 to less than a quarter of what was seen in the previous two years, according to IBM's annual research report on threats and risks. There was still plenty of spam, however.
Twitter is warning users of the popular UberSocial Twitter-messaging software that direct messages they send may not be private.
VeriSign has added an extra layer of security to the Internet's .com domain, but e-retailers, banks and other Web site operators will need to upgrade their DNS hardware, software or services to take advantage of .com's new cryptographic features.
When Alex Eckelberry first read news reports on Wednesday that some of Samsung's R Series laptops contained keylogging software, he was as astounded as everybody else.
The personal information of 13,000 individuals who had filed compensation claims with BP after last year's disastrous oil spill may have been potentially compromised after a laptop containing the data was lost by a BP employee.
Our social networks say a lot about us. When you register with a Website like Facebook, you voluntarily give up personal information like your name, photo, and phone number in exchange for the privilege of access to a network that makes it easy to ke...
Samsung Electronics is investigating allegations that some models of its R Series laptops contain keylogging software that could be used to record anything typed on the laptop computers.
The hacker group that exposed holes in McAfee's website knows it's breaking U.S. law, but vows to continue exposing vulnerabilities, especially on security vendor websites.
The hacker who claimed credit for breaking into systems belonging to digital certificate vendor Comodo said he has compromised another certificate authority, along with two more Comodo partners, a move that could further undermine trust in the system...
Google has agreed to settle a complaint from the U.S. Federal Trade Commission charging the company with using deceptive tactics and violating its own privacy promises to consumers when it launched its social network, Google Buzz.
Most Popular Reviews
- 1 Samsung Galaxy Tab S (10.5) 4G review
- 2 Nokia Lumia 930 review
- 3 Asus G550JK gaming notebook
- 4 Fetch TV set-top box
- 5 Dell Inspiron 15 5547 laptop
Best Deals on GoodGearGuide
Latest News Articles
- Tablets priced under $35 on the horizon
- VMware acquires CloudVolumes for faster virtual app delivery
- HP reports surprise growth as PC sales climb
- R programming language gaining ground on traditional statistics packages
- How can the Internet have too many routes and not enough addresses?
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.