A new Trojan program is targeting users of the popular online role-playing game World of Warcraft and is capable of hijacking accounts even if their owners use two-factor authentication.
The OpenSSL Project confirmed that weak passwords used on the hosting infrastructure led to the compromise of its website, dispelling concerns that attackers might have exploited a vulnerability in virtualization software.
A security hole in popular photo messaging service Snapchat could allow attackers to find the phone numbers of many users in a short period of time, according to Gibson Security, a computer security research group.
Microsoft has joined the FIDO Alliance, an industry group attempting to craft industry standards that reduce reliance on passwords, long regarded as a weak point in Web security.
Thirteen people, including the creator of Blackhole, a popular exploit tool used to infect computers with malware, were arrested and charged in Russia with creating and participating in a criminal organization.
A security researcher has released software and technical instructions for modifying a drone so that it can identify and hijack other drones.
A new Trojan program that targets users of online financial services has the potential to spread very quickly over the next few months, security researchers warn.
Hackers reportedly stole 42 million customer records including email addresses and clear-text passwords from Cupid Media, a network of dating websites.
Popular source code repository service GitHub has recently been hit by a brute-force password-guessing attack that successfully compromised some accounts.
Attackers are actively exploiting a known vulnerability to compromise JBoss Java EE application servers that expose the HTTP Invoker service to the Internet in an insecure manner.
Facebook locked some users out of their accounts after determining that their log-in credentials were exposed as a result of a security breach at Adobe. The company is asking users who used the same log-in credentials for Adobe's online services and ...
A new variant of a Trojan program that targets online banking accounts also contains code to search if infected computers have SAP client applications installed, suggesting that attackers might target SAP systems in the future.
Security experts used fake Facebook and LinkedIn profiles pretending to represent a smart, attractive young woman to penetrate the defenses of a U.S. government agency with a high level of cybersecurity awareness, as part of an exercise that shows ho...
Many open-source software developers need to improve the way in which they handle vulnerability reports, according to researchers from security firm Rapid7, who recently found and reported vulnerabilities in seven popular open-source software applica...
The Internet Archive, the online repository of millions of digitized books, wants to shield its readers from other's prying eyes -- like the government's.
Latest News Articles
- LTE network for US public safety taking it one step at a time
- Phone unlocking bill clears US House, next step is president's signature
- Oracle's new in-memory database option could spark unanticipated costs, expert warns
- Bose sues Beats over headphone patents
- SEC drops probe into Facebook's pre-IPO sales disclosures
Most Popular Articles
- 1 What's the difference between an Intel Core i3, i5 and i7?
- 2 Laser vs. inkjet printers: which is better?
- 3 Windows 7 Home Premium vs. Windows 7 Professional
- 4 How to play DVD movies on your Nintendo Wii
- 5 How do I connect my TV to the Internet?
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Best Deals on GoodGearGuide
- Notebooks View all »
- $569.95 free shipping
- $61.95 free shipping
- 27% off $3489 free shipping
- 60% off $11.99
- 60% off $12.99
- Tablets View all »
- Mobile Phones View all »
- TVs View all »
- Digital Cameras View all »