It's generally accepted that antivirus programs provide a necessary protection layer, but organizations should audit such products before deploying them on their systems because many of them contain serious vulnerabilities, a researcher warned.
The EU court ruling that gives people the "right to be forgotten" by search engines is misguided in principle and unworkable in practice, said a U.K. House of Lords subcommittee Wednesday.
An open-source project has released the first free application for the iPhone that scrambles voice calls, which would thwart government surveillance or eavesdropping by hackers.
Symantec's Endpoint Protection product has three zero-day flaws that could allow a logged-in user to move to a higher access level on a computer, according to a penetration testing and training company.
Now that BlackBerry has fallen significantly behind Apple and Google in the race to offer features and third-party apps for its smartphones, the company is concentrating on providing devices that, it claims, have the strongest available security -- t...
U.S. Senator Patrick Leahy has introduced a new version of a bill to rein in the National Security Agency's bulk collection of U.S. phone records in an effort to strengthen legislation that passed the House of Representatives this year.
The IT infrastructure of the National Research Council of Canada was recently compromised by highly sophisticated Chinese state-sponsored hackers, the Canadian government said Tuesday.
The majority of Android devices currently in use contain a vulnerability that allows malware to completely hijack installed apps and their data or even the entire device.
U.S. and EU privacy and consumer groups called on privacy regulators to stop Facebook's plans to gather the Internet browsing patterns of its users while they visit other sites.
A configuration problem in Facebook's popular Instagram application for Apple devices could allow a hacker to hijack a person's account if they're both on the same public Wi-Fi network.
Attackers are exploiting a vulnerability in distributed search engine software Elasticsearch to install DDoS malware on Amazon and possibly other cloud servers.
Vulnerabilities in the Tails operating system could reveal your IP address, but you can avoid trouble by taking a couple of precautions.
The Russian Ministry of Interior is willing to pay 3.9 million roubles, or around US$111,000, for a method to identify users on the Tor network.
European data protection authorities still have questions after meeting with Google, Microsoft and Yahoo about the implementation of a recent ruling that gave European citizens the right to be forgotten by search engines.
An iPhone user has filed a lawsuit for invasion of privacy against Apple, about a week after a Chinese state broadcaster raised security concerns about the device's location-tracking functions.
Most Popular Reviews
- 1 Samsung Galaxy Tab S (10.5) 4G review
- 2 LG G3 review
- 3 Nokia Lumia 930 review
- 4 Asus G550JK gaming notebook
- 5 Fetch TV set-top box
Best Deals on GoodGearGuide
Latest News Articles
- PC market in 2014 a bit less dire than previously thought
- Cotap, a WhatsApp for the enterprise, links with cloud storage providers
- Apple loses bid for sales ban in Samsung patent case
- Broadcom wants to let 1,000 IoT devices bloom with $19.99 development kit
- Microsoft rolls out DLP to SharePoint Online and OneDrive for Business
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
- FTMachine Learning | JAVA | San Fran based global Company | SydneyNSW
- FTAccount Manager Programmatic Trading DeskNSW
- FTInformation Services ManagerNZ
- CCL2 Technical Support Engineer - RightFax/MessagingVIC
- FTSearch Account ManagerNSW
- FTMarketing Communications Executive - B2BNSW
- FTChief Information OfficerNSW