Mobile device management company Good Technology is stepping up its efforts to attract organizations that want to leave BlackBerry behind by acquiring assets from Fixmo and launching a new secure mobile collaboration app.
Many WordPress websites could be at risk of compromise if their administrators don't upgrade a popular search engine optimization (SEO) plug-in to a newly released version that fixes serious vulnerabilities.
Someday, if you use your non-dominant hand to control your mouse or touchpad when you're say, shopping online, websites might interpret your irregular scrolling and clicking as a sign of fraud and require you to prove your identity, thanks to an IBM ...
Inexpensive equipment can be used to disrupt vessel-tracking systems and important communications between ships and port authorities, according to two security researchers.
Two European companies have partnered to tackle the growing problem of fraudulent refilling of high-end wine and spirits bottles using a seal system based on near field communication chips.
Security researchers uncovered a global cybercriminal operation that infected with malware almost 1,500 point-of-sale (POS) terminals, accounting systems and other retail back-office platforms from businesses in 36 countries.
The electronic voting system that has been used in Estonia since 2005 cannot guarantee fair elections because of fundamental security weaknesses and poor operational procedures, according to an international team of security and Internet voting resea...
Despite taking prompt action to defend against the Heartbleed attack, some sites are no better off than before -- and in some cases, they are much worse off.
Dropbox has disabled old shared document links in a bid to prevent its users' files from being accessed by unintended recipients.
Cybercriminals stole debit card information from customers of dozens of financial institutions in a phishing campaign that combined rogue text messages and with VoIP calls.
The security researcher who identified an admin backdoor in a range of routers last year has found that Netgear's patches don't adequately address the security issue.
NEC has launched a biometric security program that uses face recognition to unlock access to PCs.
Web application attacks, cyber-espionage and point-of-sale intrusions were among the top IT security threats in 2013, according to Verizon's latest annual report on data breach investigations.
Security researchers have found that many satellite communication systems have vulnerabilities and design flaws that can let remote attackers intercept, manipulate, block and in some cases take full control of critical communications.
Cybercriminals have started using a sophisticated Android Trojan app designed for e-banking fraud to target Facebook users, possibly in an attempt to bypass the two-factor authentication protection on the social network.
Latest News Articles
- Almost 200,000 people may have been affected by US visa system crash
- Who wins if Iliad buys T-Mobile?
- Most USB thumb drives can be reprogrammed to silently infect computers
- Windows Server 2003 support expiration could push sales next year
- US judge rules against Microsoft in email privacy case
Most Popular Articles
- 1 What's the difference between an Intel Core i3, i5 and i7?
- 2 Laser vs. inkjet printers: which is better?
- 3 Windows 7 Home Premium vs. Windows 7 Professional
- 4 How to play DVD movies on your Nintendo Wii
- 5 How do I connect my TV to the Internet?
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Best Deals on GoodGearGuide
- Notebooks View all »
- $25 free shipping
- 78% off $2.98
- Tablets View all »
- Mobile Phones View all »
- TVs View all »
- Digital Cameras View all »