Mocana's Atlas platform is intended to make it easier for users to access enterprise apps from their smartphones without compromising security.
An unprotected SSH access key left inside the Cisco Unified Communications Domain Manager product for remote support purposes allows attackers to take complete control of affected deployments.
A critical vulnerability found in a WordPress plug-in that has been downloaded over 1.7 million times allows potential attackers to take complete control of blogs that use it.
PayPal was one of the first large online services providers to offer two-factor authentication to its users, but until recently the company's implementation had a loophole that could have allowed attackers to bypass this additional protection.
Users who accessed some stories on the Reuters website Sunday were redirected to a message from hackers criticizing the news agency's coverage of Syria.
A code-hosting and project management services provider was forced to shut down operations indefinitely after a hacker broke into its cloud infrastructure and deleted customer data, including most of the company's backups.
Breaking with other players in the IT industry, Amazon's CTO has downplayed any impact of the Edward Snowden revelations on its international business.
Russian authorities arrested a man and a teenaged boy from Moscow under suspicion that they compromised Apple ID accounts and used Apple's Find My iPhone service to hold iOS devices for ransom.
Many servers expose insecure management interfaces to the Internet through microcontrollers embedded into the motherboard that run independently of the main OS and provide monitoring and administration functions.
AT&T plans to test a service allowing payment card providers to access the location of a customer's phone to improve the accuracy of fraud prevention systems for transactions made abroad.
Mobile device management company Good Technology is stepping up its efforts to attract organizations that want to leave BlackBerry behind by acquiring assets from Fixmo and launching a new secure mobile collaboration app.
Many WordPress websites could be at risk of compromise if their administrators don't upgrade a popular search engine optimization (SEO) plug-in to a newly released version that fixes serious vulnerabilities.
Someday, if you use your non-dominant hand to control your mouse or touchpad when you're say, shopping online, websites might interpret your irregular scrolling and clicking as a sign of fraud and require you to prove your identity, thanks to an IBM ...
Inexpensive equipment can be used to disrupt vessel-tracking systems and important communications between ships and port authorities, according to two security researchers.
Two European companies have partnered to tackle the growing problem of fraudulent refilling of high-end wine and spirits bottles using a seal system based on near field communication chips.
Most Popular Reviews
- 1 HP Stream 11 laptop
- 2 Acer Chromebook 11 (CB3-111)
- 3 Asus Zenbook UX303LN Ultrabook
- 4 Samsung's Galaxy Alpha review: A peek into the Galaxy S6
- 5 Lenovo Yoga 3 Pro hybrid Ultrabook
Best Deals on GoodGearGuide
Latest News Articles
- LG readies webOS TVs with better performance, 4K content
- Microsoft kills EU browser choice screen
- New undersea cable to link Australia and New Zealand
- Sony cancels 'The Interview' release after threats following cyberattack
- Forensic software gets around iCloud security features
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.