NEW YORK -- Social networks are a major resource for hackers trying to capture valuable corporate data or run amok inside business networks, the information security director of a major online trading firm told Security Standard attendees.
The video surveillance industry is undergoing a sea change as older analog systems give way to IP-based systems.
Verizon Wireless today announced that Android smartphones using its network can now use Good Technology's security and management software.
What is the most significant vulnerability that information security faces today and in the future? According to Malcolm Harkins, CISO of Intel, the biggest threat facing infosec is the misperception of risk.
The "<a href="http://www.networkworld.com/news/2010/090910-here-you-have-e-mail-worm.html?t51hb">Here You Have</a>" e-mail virus that ripped across the Internet last week didn't leave Intel unscathed: The 80,000-plus employee company had 4,400 employ...
Apple patched a critical vulnerability in QuickTime on Wednesday that was reported to the company by a bug bounty program months ago.
The Stuxnet worm is a "groundbreaking" piece of malware so devious in its use of unpatched vulnerabilities, so sophisticated in its multi-pronged approach, that the security researchers who tore it apart believe it may be the work of state-backed pro...
Google patched 10 vulnerabilities in Chrome this week, including one pegged critical on the Mac.
The "Here You Have" e-mail virus that ripped across the Internet last week didn't leave Intel unscathed: The 80,000-plus employee company had 4,400 employees click on the malware and wound up with 400 infected machines.
A database security vendor says colleges and universities need to do more to secure their databases against break-ins.
Interest in IT security certifications is booming, as more U.S. companies tighten up the protection surrounding their critical network infrastructure and as a growing number of employees view security expertise as recession proof.
A third of US SMEs claim to have experienced malware or virus infection as a result of staff using social media websites, Panda Security's first Social Media Risk Index survey has found.
ORLANDO -- The National Security Agency wants to use commercially-built security products and the latest virtualization software. But the slow pace of getting products certified through NSA channels and the lightening fast pace of change in the IT in...
In an era where online privacy seems like an oxymoron, is it so bad to have your browsing history publicly available? Or to pay less than $20 to have these details removed from the Internet?
Microsoft released <a href="http://www.microsoft.com/technet/security/bulletin/ms10-sep.mspx">nine new security bulletins</a>--four with an overall rating of Critical this week for the September Patch Tuesday. The big news of the month, though, is th...
Latest News Articles
- Google Glass to get a workout from Dutch firefighters
- Nokia doesn't want you to get shocked, suspends tablet sales because of faulty charger
- Facebook users targeted by iBanking Android trojan app
- Samsung and Amazon customize Kindle app, offer free e-books
- Ruggedized scientific calculator perfect for extreme math
Most Popular Articles
- 1 Tethering tutorial: How to use your iPhone as a modem
- 2 The most disturbing YouTube videos of all time
- 3 Buying guide: Ovens, cooktops and freestanding cookers (upright ranges)
- 4 Top 5 reasons to hate the Samsung Galaxy S5
- 5 Capacitive vs resistive touchscreens
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Best Deals on GoodGearGuide
- Notebooks View all »
- $25.99 free shipping
- Tablets View all »
- Mobile Phones View all »
- TVs View all »
- Digital Cameras View all »