The Windows zero-day bug now being used by attackers is extremely dangerous, security researchers said Friday, and ranks with the Windows Metafile vulnerability of more than a year ago on the potential damage meter.
The accused mastermind behind the Panda Burning Incense worm has not done a very good job of making amends, according to security vendor Symantec.
Mobile printing has never been easier. For a busy office, reliable and easy-to-use tools are essential. Samsung's latest smart printers are equipped for wireless printing from mobile devices. Find out more about what is all about.
Microsoft confirmed Thursday that Windows, including Vista, contains a critical unpatched vulnerability that can be used by attackers to usurp PCs when users surf to malicious sites.
While the vast majority of networks today are based on the IPv4 protocol, the U.S. government is mandating that defence and civilian agencies are ready to accept IPv6-based traffic as well by June 2008. Those guiding the effort know the transition wo...
Hackers have built their own encrypted IM (instant-message) program to shield themselves from law enforcement trying to spy on their communication channels.
Google is having problems keeping its uptime pledge to some paying customers of its Google Apps suite of hosted services, throwing into question the company's ability to offer guaranteed levels of application reliability.
PayPal, the Internet-based money transfer system owned by eBay, is trying to persuade e-mail providers to block messages that lack digital signatures, which are aimed at cutting down on phishing scams, a company attorney said Tuesday.
For at least the third time this month, Google is grappling with performance and availability problems in the Gmail service of Google Apps, the suite of hosted services that many consider a potential threat to Microsoft's Office suite of desktop soft...
Malware purveyors are increasingly tailoring their virus distribution and attack techniques to take advantage of different classes of end-users, according to researchers with the Internet Security Systems' X-Force team at IBM.
Bugs in Sun Microsystems's StarOffice and OpenOffice.org's OpenOffice application suites allow attackers to snatch control of a computer by serving up malicious documents or URLs, the two organizations said Monday.
Latest News Articles
- Apple hit with class action lawsuit for alleged labor rule violations
- Panasonic Lumix DMC-FZ1000 digital camera with 4K video shooting
- Seafaring robot shrugs off monster Typhoon Rammasun
- Zero-day flaws in Tails aren't for sale, vulnerability broker says
- How Nokia both helped and hindered Microsoft's earnings
Most Popular Articles
- 1 What's the difference between an Intel Core i3, i5 and i7?
- 2 Laser vs. inkjet printers: which is better?
- 3 Windows 7 Home Premium vs. Windows 7 Professional
- 4 How to play DVD movies on your Nintendo Wii
- 5 How do I connect my TV to the Internet?
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.