Western Digital delivers 1TB of storage and good security in a portable package
A newly created working group within the Internet Engineering Task Force (IETF) has set out to develop best practices for deploying SSL encryption for Internet communications.
A fake antivirus program in circulation uses at least a dozen stolen digital code-signing certificates, indicating cybercriminals are increasingly breaching the networks of software developers, Microsoft wrote on Sunday.
A third-party advertising framework integrated in hundreds of Android apps contains a vulnerability that could allow hackers to steal sensitive information from users' phones, according to security researchers from antivirus firm Bitdefender.
An intermediate certificate authority (CA) registered to the French Ministry of Finance issued rogue certificates for several Google domains without authorization.
Twitter has implemented new security measures that should make it much more difficult for anyone to eavesdrop on communications between its servers and users, and is calling on other Internet companies to follow its lead.
FreeOTFE may sound like a political bumper sticker, but it stands for "Free On The Fly Encryption." The "Free" part is self-explanatory; "On The Fly Encryption" refers to the encrypting/decrypting of data as it is written to or read from your hard di...
Despite the convenience, free public Wi-Fi networks like those found in hotels, Starbucks, and McDonald's are also a serious risk when it comes to your data and personal information.
Losing your laptop can be expensive in three ways. First, you'll spend hundreds or thousands of dollars to replace the hardware. Second, you'll suffer the time and aggravation of restoring your data, all the while hoping you have everything backed up...
Paranoia--in small doses--is an excellent preventive medicine. If you think your business is too small to be a target for hackers, identity thieves, and similarly unsavory characters, you're dangerously underestimating the value of your business.
Yet another survey is indicating that security is a big issue for those intending to take up cloud computing.
The largest single type of security breach is the stolen or lost laptop, according to the Open Security Foundation, yet these computers are among the least protected of all IT assets. The costs of a data breach can be huge, including the loss of trad...
Whitepapers about encryption
Network hacking and corporate espionage are on the rise and set to intensify. Information security risks remain commonplace, and most organisations need to increase vigilance. This paper has analyses the realistic threats to fibre optic Ethernet networks – both at the LAN and WAN level. Read now.
Latest News Articles
- LTE to make spectrum-rich richer in 2014: Analysys Mason
- Guide: Last-minute Christmas gifts
- Acer focuses on cloud services to revive business
- Target customers' card data said to be at risk after store thefts
- Washington Post reports servers attacked, suspects Chinese hackers
Most Popular Articles
- 1 What's the difference between an Intel Core i3, i5 and i7?
- 2 Laser vs. inkjet printers: which is better?
- 3 Windows 7 Home Premium vs. Windows 7 Professional
- 4 How do I connect my TV to the Internet?
- 5 Samsung’s 2013 Smart TVs: everything you need to know
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Best Deals on GoodGearGuide
Best Deals on PCWorld
- NotebooksView all »
- TabletsView all »
- Mobile PhonesView all »
- Printers & ScannersView all »
- Networking, Wireless & VoIPView all »