A security researcher has published exploit code for the latest Internet Explorer zero-day flaw on the Web and Microsoft is warning that more attacks against the unpatched vulnerability can be expected in-the-wild. One thing seems to be more apparent...
Cybercrime is becoming an ever increasing threat.
Mobile printing has never been easier. For a busy office, reliable and easy-to-use tools are essential. Samsung's latest smart printers are equipped for wireless printing from mobile devices. Find out more about what is all about.
This past January, the health organisation Kaiser Permanente reported a theft of an external hard drive from an employee's car. The hard drive contained data on about 15,500 Northern California patients, including their full names, medical record n...
Lock down your PC.
Quick: What's a hacker? A pimply faced teenager in a dark bedroom trying to start World War Three, or a thirty-something professional with mad computer skills?
Dear Facebook, I appreciate your service. I really do.
No one likes to be hated, but if you're running a small business, sometimes you've got to take security measures that will make your employees really angry. You might even have to (gasp) pull some PCs off the Internet, and treat some employees like, ...
Laptop computers have become mobile stores of massive amounts of information. Add to that the proliferation of removable hard drives, and it becomes crystal clear how much sensitive data is on the move in the world, most of it woefully underprotected...
Kaspersky Lab may not be a household name in the United States, but in some parts of the world, it's the most popular consumer antivirus software. In China the company boasts 100 million users, and the software is also popular in Germany, and, of cou...
Do you know how to guard against scareware? How about Trojan horse text messages? Or social network data harvesting?
About two weeks after Google publicly squared off with the Chinese government, the world is still watching for the search company's next step.
If you think spam attacks were bad in 2009, just wait until 2010 gets going.
Rootkits, a type of stealth technology used by malware malefactors, attempt to hide in the dark corners of an infected PC and evade detection. A new post out today from the Microsoft Malware Protection Center shines the spotlight on the evil tools.
If you're concerned about the privacy implications of reading digital books, take a look at a nice guide put up yesterday by the Electronic Frontier Foundation.
Many organizations are embracing SOA as a way to increase application flexibility, make integration more manageable, lower development costs, and better align technology systems to business processes. The appeal of SOA is that it divides an organizat...
Most Popular Reviews
- 1 HTC One Mini 2 android smartphone
- 2 Microsoft Surface Pro 3 Windows 8.1 tablet
- 3 Medion Akoya E4110 (MD 8239) desktop PC
- 4 Samsung Galaxy Tab S (10.5) 4G review
- 5 Dell Inspiron 11 3000 Series convertible laptop
Best Deals on GoodGearGuide
Latest News Articles
- Larry Ellison's best zingers: a look back
- Mysterious entity acquires TwitPic, saving it from death
- Hundreds line sidewalks as Apple iPhone 6 hysteria takes over Sydney
- Alibaba's IPO could be 'open sesame' for global expansion
- Here's the first iPhone 6 sold at the Sydney city store
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.