A U.S. company that says its code was copied by a Chinese Internet filtering program has ordered more PC makers not to distribute the Chinese software.
How do you make a terrible thing even worse? If you're a crook who operates a botnet -- an often-expansive network of malware-infected PCs -- you link botnets together to form a gargantuan "botnetweb." And you do it in a way that's hard for an antivi...
Mobile printing has never been easier. For a busy office, reliable and easy-to-use tools are essential. Samsung's latest smart printers are equipped for wireless printing from mobile devices. Find out more about what is all about.
China will submit its wireless LAN security protocol to the International Organization for Standardization (ISO) for consideration as a global standard, years after its rejection by the standards body incensed Chinese backers.
The Kantara Initiative, formed to promote interoperability among identity verification applications and services, launched on Wednesday with big-name backers like Oracle, Intel, eBay's PayPal, AOL, CA, Novell, Fidelity Investments, Liberty Alliance, ...
Who should know more about PC threats than the company whose software makes most of them possible? Is Microsoft's upcoming, free anti-malware app the company's way of apologizing to customers?
The U.S. government has significant work to do before it can better cooperate with the private sector and other governments to better protect cybersecurity, a government cybersecurity expert said.
NEW YORK CITY -- Imagine a situation where a powerful country wants to annex its small neighbor, so it launches a week-long campaign of cyberattacks aimed at disrupting the financial, energy, telecom and media systems of its neighbor's biggest ally. ...
Twitter users who thought friends were directing them to a "funny blog" Thursday ended up experiencing something completely different: a phishing scam.
The U.S. government says it's lost - yes, lost - an entire hard drive full of sensitive data. The external drive, stored at the U.S. National Archives and Records Administration, held personal data from the Clinton era, including information about Wh...
A new attack that peppers Google search results with malicious links is spreading quickly, the U.S. Computer Emergence Response Team warned on Monday.
I am a genius. I'm charismatic, kind, and understanding. I'm also a Disney princess named Aurora and the reincarnation of Marilyn Monroe.
Cloud computing is a reality, and it's a force that IT professionals need to quickly come to terms with. The economic and social motivation for the cloud is high, the business need for speed and agility is greater than ever before, and the technology...
We've worked long and hard to come up with the best tips and tricks for your PCs, smartphones, cameras, game controllers, music players, and the Web. Let's start with PC, laptop, and networking tips.
Although he acknowledges that businesses have yet to embrace IPv6, security guru Scott Hogg says that doesn't mean IT executives can ignore the security problems that the next generation Internet protocol can present. After all, he notes, operating s...
Forewarned is forearmed. We investigate the latest and most deadly tech dangers, and explain how to fight back.
Latest News Articles
- Hortonworks, Pivotal team to better manage Hadoop
- Defending Facebook, OkCupid says it also runs user-behavior tests
- Rimini Street keeps growing despite specter of Oracle lawsuit
- Attackers install DDoS bots on Amazon cloud, exploiting Elasticsearch weakness
- Chinese users tire of older social networking sites
Most Popular Articles
- 1 What's the difference between an Intel Core i3, i5 and i7?
- 2 Laser vs. inkjet printers: which is better?
- 3 Windows 7 Home Premium vs. Windows 7 Professional
- 4 How to play DVD movies on your Nintendo Wii
- 5 How do I connect my TV to the Internet?
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.