Dozens of self-signed SSL certificates created to impersonate banking, e-commerce and social networking websites have been found on the Web. The certificates don't pose a big threat to browser users, but could be used to launch man-in-the-middle atta...
Attacks recently observed in Poland involved cybercriminals hacking into home routers and changing their DNS settings so they can intercept user connections to online banking sites.
Tumblr now allows users to encrypt their connections with the microblogging service, but the feature is only offered as an option for now.
Belgian cryptographer Jean-Jacques Quisquater had his personal computer infected with malware as the result of a targeted attack that's believed to be related to a security breach discovered last year at Belgian telecommunications group Belgacom. Acc...
Email, perhaps still the most widely used Internet application, has about the same level of security as a postcard. But unlike postcards, it's widely depended on by businesses.
Hackers found a new way to slip past security software and deliver Zeus, a long-known malicious software program that steals online banking details.
Over the past several months security researchers have found serious vulnerabilities in many mobile advertising libraries that could be exploited to abuse the permissions of Android apps or to execute unauthorized code on users' devices. The risks re...
Payment card data was stolen during the past three months from several dozen retailers that had their point-of-sale systems infected with a memory-scraping malware program called ChewBacca.
While privacy advocates may see Lavabit as bravely defending U.S. privacy rights in the online world, federal judges hearing its appeal of contempt-of-court charges seem to regard the now defunct encrypted email service as just being tardy in complyi...
A vulnerability in Android allows malicious applications to bypass an active VPN (virtual private network) connection and force traffic from the device through an attacker-controlled system where it can be intercepted, according to security researche...
Some of the most prominent cryptography and security researchers in U.S. academia have condemned the U.S. National Security Agency's surveillance practices and called for change.
Computer scientists found almost 20 exit relays in the Tor anonymity network that attempted to spy on users' encrypted traffic using man-in-the-middle techniques.
Two-year-old startup Wickr is offering a reward of up to US$100,000 to anyone who can find a serious vulnerability in its mobile encrypted messaging application, which is designed to thwart spying by hackers and governments.
Playing on mobile users' fears of commercial and government surveillance, two companies are building a phone they say is designed to protect privacy. The joint venture between smartphone manufacturer Geeksphone and encrypted communications provider S...
The CEO of retailer Target revealed Saturday in an interview that the company's point-of-sale (PoS) systems were infected with malware, confirming what security experts suspected since the massive data breach was announced in mid-December.
Most Popular Reviews
- 1 HTC One Mini 2 android smartphone
- 2 Microsoft Surface Pro 3 Windows 8.1 tablet
- 3 Medion Akoya E4110 (MD 8239) desktop PC
- 4 Samsung Galaxy Tab S (10.5) 4G review
- 5 Dell Inspiron 11 3000 Series convertible laptop
Best Deals on GoodGearGuide
Latest News Articles
- IEEE standards group wants to bring order to IoT
- InfiniDB going out of business, but its database will live on as open source
- FCC questions how to enforce net neutrality rules
- SAP CEO Bill McDermott on why Concur is worth $8.3 billion
- Alibaba shares open at a high $92.70
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.