Don't worry, you're not the only one with more questions than answers about the 1.2 billion user credentials amassed by Russian hackers.
It's generally accepted that antivirus programs provide a necessary protection layer, but organizations should audit such products before deploying them on their systems because many of them contain serious vulnerabilities, a researcher warned.
A vulnerability allows attackers to disable Microsoft's antimalware products by sending specifically crafted files to users via websites, email or instant messaging applications.
A malware campaign of yet-to-be-determined origin is infecting jailbroken iPhones and iPads to steal Apple account credentials from SSL encrypted traffic.
A new variant of the Gameover computer Trojan is targeting job seekers and recruiters by attempting to steal log-in credentials for Monster.com and CareerBuilder.com accounts.
A new variant of the Gameover malware that steals online banking credentials comes with a kernel-level rootkit that makes it significantly harder to remove, according to security researchers from Sophos.
Fortinet, one of the biggest computer security vendors, is suing rival Sophos alleging it poached senior staff in breach of an agreement signed when a Fortinet executive jumped ship to Sophos earlier this year.
The creators of CryptoLocker, a piece of malware that encrypts user data and holds it for ransom, are giving users who removed the malicious program from their computers a second chance to recover their files, but at a much higher cost.
Domain registrar Name.com forced its customers to reset their account passwords on Wednesday following a security breach on the company's servers that might have resulted in customer information being compromised.
Social network's new overlay for Android smartphones 'would be the first thing I would block on my network,' said one security adviser
Security vendor Sophos has released an update for the software used on its Web gateway security appliance in order to address three serious vulnerabilities in the product's Web-based user interface.
The majority of email and Web gateways, firewalls, remote access servers, UTM (united threat management) systems and other security appliances have serious vulnerabilities, according to a security researcher who analyzed products from multiple vendor...
Until late January, Apple's App Store servers did not encrypt all communications with iOS clients, which exposed users to several potential attacks, according to a Google security researcher.
One week after launching a security bug bounty program, the new file-storage and sharing service Mega claims to have fixed seven vulnerabilities, none of which met its highest severity classification.
Turktrust, the Turkish certificate authority (CA) responsible for issuing an intermediate CA certificate that was later used to generate an unauthorized certificate for google.com, claims that the bad Google certificate was not used for dishonest pur...
Most Popular Reviews
- 1 Samsung Galaxy Tab S (10.5) 4G review
- 2 Nokia Lumia 930 review
- 3 Asus G550JK gaming notebook
- 4 Fetch TV set-top box
- 5 Dell Inspiron 15 5547 laptop
Best Deals on GoodGearGuide
Latest News Articles
- Amazon strikes deal in China to offer more imported goods
- Retired US airport body scanners fail to spot guns, knives
- WD celebrates 10-year anniversary of My Passport with sleeker, more stylish models
- Seagate goes after small business market with new NAS devices
- Analysis of tweets around Ferguson shows Twitter's quick grip on the news
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
- FTMachine Learning | JAVA | San Fran based global Company | SydneyNSW
- FTMarketing Communications Executive - B2BNSW
- FTChief Information OfficerNSW
- FTAccount Manager Programmatic Trading DeskNSW
- FTSearch Account ManagerNSW
- CCL2 Technical Support Engineer - RightFax/MessagingVIC
- FTInformation Services ManagerNZ