In the last three months of 2010 attackers managed to serve 3 million malicious advertising, or malvertising, impressions every day. That's the headline figure from a report released today from Web security firm Dasient. According to Dasient, that's ...
IT staff spent the weekend in a massive clean-up operation to remove traces of a "spectacular" attack on computers at Bercy, the headquarters of the French Ministry of Economy, Finances and Industry, a government minister said Monday.
In theory, stopping spam is easy: just make it uneconomic to send millions of messages by charging for each one sent, or make senders authenticate their identity to stop address spoofing and simplify blocking.
Extreme Networks is going mobile. The company today wheeled out a roadmap that will steer the company's product line toward mobile device and application access, availability and management support.
Google will offer its hundreds of millions of users the option of adding a second verification step when signing into their accounts, to complement the existing password-only authentication mechanism.
Web service Evite offers more than a convenient way to send out e-mail invitations to events. For those with even a modest amount of malicious gumption, the site can also provide a treasure trove of personal information, at least according to one sec...
An IBM site for developers was defaced over the weekend, with attackers replacing some of the Web pages on the site with ones containing their own messages, IBM confirmed Monday.
The sale of iTunes accounts that have reportedly been hacked has yet to be stopped by Apple or the Chinese e-commerce site hosting the sellers.
The Cloud Security Alliance (CSA) has launched a revision of the Cloud Controls Matrix (CCM). The new matrix (version 1.1), available for free download, is designed to provide fundamental security principles to guide cloud vendors and help prospectiv...
A recent glitch on Microsoft's download servers for brand new Windows Phone 7 applications has sparked widespread Internet chatter among developers and focused new attention on the best ways to protect smartphone apps from being hacked.
With its pending US$2.2 billion purchase of Novell, Attachmate is acquiring a rich portfolio of technologies. The next step will be actually putting these riches to work, analysts said Monday.
VMware is working on products that will give enterprises more control over Software-as-a-Service (SaaS) applications, including how users are authenticated, company CTO Steve Herrod, said in an interview on Tuesday.
Joining a growing number of enterprise and consumer-facing Web services, Google has added support in Google Apps for the OAuth authorization profile, the company announced Monday.
The emerging OAuth 2.0 Web API authorization protocol, already deployed by Facebook, Salesforce.com and others, is coming under increased criticism for being too easy to use, and therefore to spoof by malicious hackers.
Users of obscure third-party Twitter applications may be surprised to find that their apps no longer work, if the app creators of those apps haven't been keeping up with changes in the Twitter API (application programming interface).
Latest News Articles
- LG's latest curved TV is a 105-inch world record breaker
- Huawei, ZTE, Nokia cleared in patent dispute with InterDigital
- Verizon to report on law-enforcement data requests
- ARM server chip pioneer Calxeda shuts down
Most Popular Articles
- 1 What's the difference between an Intel Core i3, i5 and i7?
- 2 Laser vs. inkjet printers: which is better?
- 3 Windows 7 Home Premium vs. Windows 7 Professional
- 4 How do I connect my TV to the Internet?
- 5 How to play DVD movies on your Nintendo Wii
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Best Deals on GoodGearGuide
Best Deals on PCWorld
- Printers & ScannersView all »
- NotebooksView all »
- TabletsView all »
- Mobile PhonesView all »
- Networking, Wireless & VoIPView all »