Microsoft on Tuesday beefed up security in Office 2003 and Office 2007 on Windows by adding a feature that first appeared in the newer Office 2010 last year.
The U.S. Department of Justice and U.S. Federal Bureau of Investigation have obtained a temporary restraining order allowing them to disrupt a computer virus that created an international botnet controlling more than 2.3 million computers as of early...
A privacy activist plans to ask for a judicial review of British prosecutors' decision not to bring a case against BT and the online advertising company Phorm for running secret trials of a system that monitored peoples' Internet use without their co...
Organisations could dramatically cut their exposure to vulnerabilities in Microsoft software simply by limiting Windows admin rights.
One of the big advantages of using Linux is that its security tends to be so much better than that of the competing alternatives.
Some of the most commonly-used firewalls are subject to a hacker exploit that lets an attacker trick a firewall and get into an internal network as a trusted IP connection.
Two high-profile U.S. senators have introduced legislation designed to give consumers more control over what information about them is collected online, but privacy advocates said the bill will do little to curb wide-spread data-collection practices ...
Do not adjust your Web browser. This may look like an identical post to the one from four weeks ago announcing a zero-day vulnerability in Adobe Flash, but it's actually a new one.
A new attack is spreading its way across Facebook, targeting fans of the epic vampire series Twilight. The clickjacking scam demonstrates just how easy it is to spread malware socially -- especially if the bait is a phenomenon like Twilight that has ...
The firewall is the line of defense separating the internal network or endpoint PC from all of the malicious bad stuff "out there". A new report from <a href="http://www.nsslabs.com/">NSS Labs</a>, though, finds that a majority of network firewalls a...
Law enforcement organizations are making tens of thousands of requests for private electronic information from companies such as Sprint, Facebook and AOL, but few detailed statistics are available, according to a privacy researcher.
Most of the time I only hear from my credit card companies when I owe them money or when they want to sell me a new service. That's changed; now I'm being bombarded with notes telling me that a company I never heard of has been successfully hacked an...
The fundamental security of the Dropbox cloud storage service has been called into question by a researcher.
For the second time in the last four weeks, Adobe has told users that hackers are exploiting an unpatched bug in Flash Player, again by embedding malicious code inside a Microsoft Office document.
A hacker has broken into a Barracuda Networks database and obtained names and e-mail addresses of some of the security company's employees, channel partners and sales leads.
Most Popular Reviews
- 1 Sony Xperia Z3 review: The no-frills flagship
- 2 Samsung's Galaxy Alpha review: A peek into the Galaxy S6
- 3 Samsung Galaxy Note 4 review: The busiest, biggest and best Samsung phablet
- 4 Aldi's $279 Bauhn Sphere review: Disappointing
- 5 Nokia Lumia 735 review: Perfectly ordinary
Best Deals on GoodGearGuide
Latest News Articles
- Hackers target Tor as PlayStation disruption continues
- Connected, self-driving cars in the front seat at CES
- MIT unifies Web development in a single, speedy new language
- Google, Microsoft, Sony make 'The Interview' available online
- Experts: FCC will adopt net neutrality rules in early 2015
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.