The first large-scale analysis of a fundamental type of software known as firmware has revealed poor security practices that could present opportunities for hackers probing the "Internet of Things."
IBM has purchased Lighthouse Security Group and plans to combine it with another recent acquisition to build a set of identity management software and services.
China's Xiaomi has apologized for causing privacy concerns, after the fledgling smartphone maker faced scrutiny over whether it can be trusted with users' personal data.
Chipmakers want to make hardware the first layer of defense against data breaches and other attacks on tablets and smartphones.
Specialized servers used by many ISPs to manage routers and other gateway devices provisioned to their customers are accessible from the Internet and can easily be taken over by attackers, researchers warn.
A collective of security researchers issued a letter Friday from the DefCon hacker conference in Las Vegas urging the automotive industry to adopt five principles for building safer computer systems in vehicles.
Key technology companies including Google, Microsoft and Twitter have filed in support of Facebook's dispute with the New York County District Attorney's office over the collection of user data in bulk under a gag order for a fraud investigation.
There's a push to adopt chip-equipped payment cards in the US following high-profile breaches at large retailers and restaurant chains during the past 12 months, but experts warn that switching to this payment system will not make fraud disappear.
A seemingly constant stream of data breaches and this week's news that Russian hackers have amassed a database of 1.2 billion Internet credentials has many people asking: Isn't it time we dumped the user name and password?
Gemalto plans to acquire SafeNet for US$890 million in a deal that would combine a big vendor of portable secure elements such as payment cards with a provider of enterprise data protection technology.
A 'class action' suit against Facebook over its privacy policies was rejected by the commercial court of Vienna, and referred to the regional court in the same city, a commercial court spokesman said Friday.
Security researchers demonstrated Thursday flaws that can allow hackers to take over mobile point-of-sale (mPOS) devices from different manufacturers by inserting rogue cards into them.
Today's security software is ineffective against an emerging networking technology already in use by Apple for its Siri voice-recognition software, according to research presented at the Black Hat hacking conference this week.
The Russian government will allow Edward Snowden, the former U.S. National Security Agency contractor who leaked details of the agency's worldwide surveillance programs, to stay in the country for three more years, according to Russia news reports.
Managing the keys of all your valuable resources, be they in the real world or the virtual, can be a hassle. Managing all the encryption keys for an entire enterprise is a harder challenge still.
Most Popular Reviews
- 1 Microsoft Surface Pro 3 Windows 8.1 tablet
- 2 Samsung Galaxy Tab S (10.5) 4G review
- 3 LG G3 review
- 4 Nokia Lumia 930 review
- 5 Asus G550JK gaming notebook
Best Deals on GoodGearGuide
Latest News Articles
- IBM Watson cooks up some new dishes
- Apple will keep pushing for a sales ban on Samsung products
- Facebook testing mobile searches for old posts
- Appeals court denies Oracle request to restore $1.3 billion judgment against SAP
- Boston's Bolt launches hardware companies
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.