Stories by Jaikumar Vijayan

Classified US military info available over P-to-P

Millions of documents, both government and private, containing sensitive and sometimes classified information are floating about freely on file sharing networks after being inadvertently exposed by individuals downloading P2P software on systems that...

Hackers use kit to unleash Trojan variants

Multiple hacker groups are using a "construction kit" supplied by the author of a Trojan horse program discovered last October to develop and unleash more dangerous variants of the original malware.

Encryption vendor sues Sony for patent infringement

Certicom, a Canadian vendor of cryptographic encryption tools, has filed a lawsuit against Sony alleging that the content protection technologies used in several Sony products infringe on two U.S. patents held by Certicom.

E-mail harvesters hit with $1B antispam lawsuit

A US$1 billion lawsuit filed Thursday promises to open up a new front in the battle against spam: It targets not just spammers, but -- for the first time -- also those responsible for harvesting e-mail addresses on behalf of spammers.

Security scare turns out to be a lot of Skype

Last Friday while doing some online banking, I noticed two transactions I'd made recently, one a withdrawal and the other a deposit. The transaction amounts were accurate, and so were the dates. The records even referenced a phone number -- complete ...

Hackers offer subscription, support for their malware

Like many just-launched e-commerce sites in the world, this unnamed Web site has a fairly functional, if somewhat rudimentary, home page. A list of options at top of the home page allows visitors to transact business in Russian or in English, offers ...

How to mitigate zero-day threats like Windows ANI

The Windows animation bug (ANI) caused widespread concern because exploits against it became widely available before Microsoft could release a patch. But like other zero-day threats before it, there are measures companies can take to at least try to ...

Judge overturns Internet child protection law

The American Civil Liberties Union (ACLU) Thursday welcomed a decision by a federal judge to overturn a 1998 law that made it a crime for Web sites to offer sexually explicit material that could be accessed by minors.

Hacker attacks getting more personal

In the same way some e-commerce sites serve up customized content based on a user's profile, cybercriminals are increasingly using personalization techniques to more effectively attack those who visit their Web sites.

Are secure connections really that secure?

The little lock icon that appears on a Web browser window frame when a secure connection exists between a browser and a Web server may be lulling users into a false sense of security.

PS3 game systems to take role in fighting Alzheimer's

Looking for a perfectly good reason to buy a Sony PlayStation 3 (PS3) game system? How about this: Starting at the end of this month, PS3 users can help researchers at Stanford University find a cure for Alzheimer's disease.

Latest News Articles

Most Popular Articles

Follow Us

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Resources

Best Deals on GoodGearGuide

Compare & Save

Deals powered by WhistleOut
WhistleOut

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?