A hacker group known as Team GhostShell is publishing snippets of sensitive data allegedly stolen from the databases of hundreds of compromised websites.
The group behind the Duqu cyberespionage tool has compromised at least two telecommunications operators and one electronic equipment manufacturer, in addition to a cybersecurity firm and venues that hosted high-level nuclear negotiations between worl...
A critical vulnerability affecting most Apple Mac models has been discovered that could enable attackers to overwrite firmware and gain persistent root access to computers.
Cybercriminals in Japan are targeting iPhone users with an online scam that tricks them into installing a malicious application when they attempt to view porn videos.
Europol, in collaboration with Dutch authorities, the U.S. FBI and private security companies, have seized the domain names used to control a botnet called Beebone.
A new malware program is being used to do reconnaissance for targeted attacks against companies in the energy sector.
It seems there can be further indignity foisted onto people who've had their iPad or iPhone stolen.
European law enforcement agencies seized command-and-control servers used by Ramnit, a malware program that steals online banking credentials, FTP passwords, session cookies and personal files from victims.
As HP reports numbers, questions will be on its split ... GOPers on FCC want to delay net neutrality vote ... Google deals for Softcard ... and more tech news.
A peer-to-peer botnet called ZeroAccess came out of a six-month hibernation this month after having survived two takedown attempts by law enforcement and security researchers.
Website owners take notice: In weeks, Mozilla products including its popular Firefox browser will stop trusting an unknown number of SSL certificates that were issued using old root CA certificates with 1024-bit RSA keys.
Keylogging malware that may have been used by the NSA shares signficant portions of code with a component of Regin, a sophisticated platform that has been used to spy on businesses, government institutions and private individuals for years.
A malware program with data wiping functionality that was recently used to attack Sony Pictures Entertainment bears technical similarities to destructive malware that affected organizations in South Korea and the Middle East in the past.
After Symantec blew the lid on Regin on Sunday, computer security experts and companies are revealing information that has lead to suspicions that the U.S. and U.K. are involved.
Malware that Symantec says was probably developed by a nation state may have been used for as long as eight years, a length of time that underscores the challenges the security industry faces in detecting advanced spying tools.
Most Popular Reviews
- 1 LG 65-inch UHD TV (65UF950T) review
- 2 Playing chicken with a Tesla Model S
- 3 Audi TT (2015) review: A smarter take on the sports coupe
- 4 Microsoft Lumia 640 review: Honouring Nokia's legacy
- 5 Apple Watch review: saving time
Join the Good Gear Guide newsletter!
Deals on Good Gear Guide
- Networking, Wireless & VoIP
Deals on Good Gear Guide
Latest News Articles
- Microsoft offers researchers $500K to work on HoloLens
- GoPro Hero4 Session: half the size and waterproof to 10 metres
- The Upload: Your tech news briefing for Monday, July 6
- Leak of ZeusVM malware building tool might cause botnet surge
- Giant mecha robots from Japan, US will meet in epic battle
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.