An intermediate certificate authority (CA) registered to the French Ministry of Finance issued rogue certificates for several Google domains without authorization.
Explosive revelations in the past six months about the U.S. government's massive cyber-spying activities have spooked individuals, rankled politicians and enraged privacy watchdogs, but top IT executives aren't panicking -- yet.
New attack campaigns have infected point-of-sale (PoS) systems around the world with sophisticated malware designed to steal payment card and transaction data.
In a development likely to concern those who believe that a system that's not connected to a network is safe from surveillance, researchers have demonstrated that microphones and speakers built into laptops can be used to covertly transmit and receiv...
The U.S. National Security Agency reportedly hacked into over 50,000 computer networks around the world as part of its global intelligence gathering efforts, and also taps into large fiber optic cables that transport Internet traffic between continen...
Once upon a time, a phone was just a phone: It simply made and received calls. The only security you worried about was if someone had picked up in the other room to listen in.
Despite the convenience, free public Wi-Fi networks like those found in hotels, Starbucks, and McDonald's are also a serious risk when it comes to your data and personal information.
Police in Austin, Texas, set up sting operations with cars they have under surveillance, watching for thieves to break into them. Marcus J. Carey's Web service, HoneyDocs -- born in the same city -- uses the same concept, only with computer files.
The US presidential election result leaves President Barack Obama in the White House and maintains the balance of power in Congress. In many longstanding technology debates, policy experts see little movement forward, although lawmakers may look for ...
Yet another survey is indicating that security is a big issue for those intending to take up cloud computing.
The sale of location information from mobile operators to service providers could result in privacy issues, and needs to be investigated, two Swedish regulators said on Tuesday.
Whether they're in branch offices or home offices, workers are increasingly telecommuting instead of working in a traditional centralized office environment.
Whitepapers about data protection
Given the advances attackers have been making, it is very unlikely that organizations will be able to keep motivated and patient adversaries out of their networks. In most cases, the best one can hope for is to detect targeted attacks early and limit the amount of information the attackers can obtain access to. In this whitepaper, we identify the timeline of a typical attack sequence and the tools available for implementing custom defence strategies.
Latest News Articles
- Apache frees Kafka messaging app from LinkedIn
- French government sub-CA issues unauthorized certificates for Google domains
- Dutch minister to question US Embassy about rooftop antennas
- Qualcomm releases Gimbal sensors for short-range tracking
- HTC One Max Android phone
Most Popular Articles
- 1 What's the difference between an Intel Core i3, i5 and i7?
- 2 How do I connect my TV to the Internet?
- 3 Laser vs. inkjet printers: which is better?
- 4 Windows 7 Home Premium vs. Windows 7 Professional
- 5 Samsung’s 2013 Smart TVs: everything you need to know
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Best Deals on GoodGearGuide
Best Deals on PCWorld
- Mobile PhonesView all »
- NotebooksView all »
- TabletsView all »
- Printers & ScannersView all »
- Networking, Wireless & VoIPView all »