Just hours before Adobe is slated to deliver the latest patches for its popular PDF viewer, a security firm announced that by its counting, malicious Reader documents made up 80% of all exploits at the end of 2009.
Imagine a scenario in which a downloadable application turns smartphones into network-clogging bots, causing U.S. mobile-phone networks to fail, and eventually spreads to the wired Internet.
The security measures at Royal Dutch Shell are under close scrutiny after the details of 176,000 employees and contractors were emailed to campaigners.
Just weeks after patching a critical flaw, Adobe Systems is rushing out another patch for its Reader and Acrobat software. The company also patched a critical issue in Flash Player Thursday.
A former security researcher turned criminal hacker has been sentenced to 13 years in federal prison for hacking into financial institutions and stealing credit card account numbers.
A popular Twitter application used to measure the influence of Twitter users has been hacked and used to send spam messages.
Former US military security specialist Christopher Tarnovsky has found a weakness in Infineon's SLE66 CL PE.
The Australian Parliament's Web site was hit by an apparent denial-of-service attack Wednesday, two days after the hacking group Anonymous threatened attacks over the government's plan to filter Web content.
In a live demonstration Wednesday at the Black Hat DC conference, a security consultant showed how it's possible to exploit a flaw in the Microsoft Internet Explorer browser to remotely read files on the victim's local drive, prompting a security adv...
Public Wi-Fi networks such as those in coffee shops and airports present a bigger security threat than ever to computer users because attackers can intercede over wireless to "poison" users' browser caches in order to present fake Web pages or even s...
The successor program to the notorious Zango spyware Toolbar is being used to target users of Mozilla's Firefox with fake browser updates, a security company has alleged.
An analysis of real-world online behaviour has warned of the unsettling phenomenon that led to this week's high-profile Twitter login scare. Far too many people re-use the same logins for more than one site.
A clever phishing scheme launched last week may have stolen more than €3 million (US$4.1 million) worth of carbon emission permits from companies.
A look back at previous Black Hat conferences reveals why it's such a big draw – presenters continue to deliver briefings that shock, amaze and amuse. See how well you remember some notorious incidents by taking this quiz. Keep track of your score an...
Twitter required some users to reset their passwords on Tuesday after discovering that their log-in information may have been harvested via security-compromised torrent Web sites, the company said.
Latest News Articles
- Could Bitcoin's frothy venture funding dry up?
- AT&T to report on government requests for user data
- Alcatel sells federal technology unit for US$200 million
- Wall Street Beat: Economic growth, software news and BlackBerry deal boost tech stocks
- NSA defends foreign surveillance after new reports of targets
Most Popular Articles
- 1 Portable Air Conditioners
- 2 How to update your Samsung Galaxy S4 to Android 4.3 Google Edition
- 3 Tethering tutorial: How to use your iPhone as a modem
- 4 LCD vs plasma vs LED TVs buying guide
- 5 Capacitive vs resistive touchscreens
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Best Deals on GoodGearGuide
Best Deals on PCWorld
- NotebooksView all »
- TabletsView all »
- Mobile PhonesView all »
- Printers & ScannersView all »
- Networking, Wireless & VoIPView all »