Security and compliance company ArcSight, which has been the subject of a takeover bid by HP, has upgraded its Enterprise Threat and Risk Management (ETRM) platform. The new version will include beefed-up ESM, the core analysis engine at the heart of...
A security flaw has made Twitter's website a chaotic and potentially unsafe place, filled with annoying pop-up windows that activate just by rolling the mouse over another user's tweets.
Linux is well-known for its security advantages over many other operating systems, but that doesn't mean it's immune to problems.
A highly sophisticated computer worm that has spread through Iran, Indonesia and India was built to destroy operations at one target: possibly Iran's Bushehr nuclear reactor.
Microsoft's full-disk encryption feature is not being widely used, even where it is part of the Windows operating system, according to a new survey released by security vendor Opswat.
A serious bug that led to a series of fast-spreading worms on Twitter's website Tuesday had been fixed in August but was accidentally re-introduced.
Google has introduced a Transparency Report that lets you see which countries are asking the search company for data on its users and making requests for data removal.
The Information Commissioner's Office (ICO) has found East & North Hertfordshire NHS Trust in breach of the Data Protection Act after an unencrypted USB stick containing patient data was lost on a train.
A serious security flaw was apparently found on Twitter on Tuesday but was quickly fixed.
The European Commission has adopted a plan to limit third-country access to travelers' data and intends to use the plan in negotiations with the U.S., Australia and Canada.
The Motion Picture Association of America (MPAA) and the Recording Industry Association of America (RIAA) fell victim to the wrath of 4chan members this weekend.
South African police have threatened a Johannesburg Twitter user with arrest for using the social media site to tweet regular updates on police road blocks and speed cameras.
By 2014, about 12 per cent of all e-commerce transactions will be made using smartphones and other mobile devices, but fraud detection tools for mobile commerce are lagging, Gartner said today.
Google added a two-factor authentication option to Google Apps on Monday, allowing enterprises to protect user accounts with a one-time code delivered through a mobile phone, in addition to the usual password.
Apple has done enough security-wise with its iPhone and iPad to make many CSOs comfortable with the mobile devices connecting to corporate networks, but Google's Android still has a ways to go.
Latest News Articles
- Twitter more than doubles its sales, stock soars
- BlackBerry focuses on security for the enterprise
- Oracle hits back at ex-employee's claims over in-memory database option
- Uber, Airbnb go after businesses
- Guns, vandals and thieves: Data shows US networks under attack
Most Popular Articles
- 1 Buying guide: Ovens, cooktops and freestanding cookers (upright ranges)
- 2 How to connect your iPhone to your TV
- 3 Tethering tutorial: How to use your iPhone as a modem
- 4 The most disturbing YouTube videos of all time
- 5 How to pick the right size TV for your living room
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Best Deals on GoodGearGuide
- Notebooks View all »
- $12 free shipping
- 11% off $529.95
- 60% off $11.99
- Tablets View all »
- Mobile Phones View all »
- TVs View all »
- Digital Cameras View all »