Western Digital delivers 1TB of storage and good security in a portable package
Google is making progress developing a user-friendly tool for fully encrypting people's messages on their computers, with coding help from Yahoo and a transition to GitHub.
Subdomains that once served a purpose but later were forgotten by website administrators can be abused by hackers to attack users of sites under the same main domain.
Webmasters who patched their sites against a serious SSL flaw discovered in October will have to check them again. Researchers have discovered that the vulnerability also affects implementations of the newer TLS (Transport Layer Security) protocol.
BlackBerry is now free to integrate German security vendor Secusmart's voice encryption technology on its smartphones and software, after the German government approved its acquisition of the company.
"Where's Andrea?" That was the question on the lips of attendees at this week's No Such Con security conference.
FreeOTFE may sound like a political bumper sticker, but it stands for "Free On The Fly Encryption." The "Free" part is self-explanatory; "On The Fly Encryption" refers to the encrypting/decrypting of data as it is written to or read from your hard di...
Despite the convenience, free public Wi-Fi networks like those found in hotels, Starbucks, and McDonald's are also a serious risk when it comes to your data and personal information.
Losing your laptop can be expensive in three ways. First, you'll spend hundreds or thousands of dollars to replace the hardware. Second, you'll suffer the time and aggravation of restoring your data, all the while hoping you have everything backed up...
Paranoia--in small doses--is an excellent preventive medicine. If you think your business is too small to be a target for hackers, identity thieves, and similarly unsavory characters, you're dangerously underestimating the value of your business.
Yet another survey is indicating that security is a big issue for those intending to take up cloud computing.
The largest single type of security breach is the stolen or lost laptop, according to the Open Security Foundation, yet these computers are among the least protected of all IT assets. The costs of a data breach can be huge, including the loss of trad...
Whitepapers about encryption
As of September 2013, a new and vicious form of malware has been wreaking havoc. CryptoLocker belongs to a family of malware called “ransomware”, which is designed to extort money from victims by denying them access to their personal files. It targets all Windows Operating Systems, from Windows XP to Windows 8, and typically remains unnoticed by victims until it’s too late and the damage to their files is irreparable.
Most Popular Reviews
- 1 HP Stream 11 laptop
- 2 Acer Chromebook 11 (CB3-111)
- 3 Asus Zenbook UX303LN Ultrabook
- 4 Samsung's Galaxy Alpha review: A peek into the Galaxy S6
- 5 Lenovo Yoga 3 Pro hybrid Ultrabook
Best Deals on GoodGearGuide
Latest News Articles
- US rejects North Korea offer to investigate Sony hack, reaches out to China
- North Korea wants joint probe into Sony hack, warns of consequences if not
- Staples says hack may have compromised 1 million-plus payment cards
- Judge questions evidence on whether NSA spying is too broad
- Three ways enterprise software is changing
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.