The developers of Replicant, a mobile OS based on Android, claim to have found a backdoor vulnerability in a software component shipped with some Samsung Galaxy devices that potentially provides remote access to users' private files through the devic...
U.S. lawmakers had a chance to pose questions to the director of the National Security Agency on Wednesday but declined to ask him about reports that the agency plans to install malware on millions of computers.
Adobe released updates for Flash Player that fix two vulnerabilities that could allow attackers to bypass security controls in the software.
For this month's "Patch Tuesday" round of bug fixes, Microsoft has focused on correcting multiple vulnerabilities in Internet Explorer (IE), including one that is already being used in targeted attacks.
Attackers have abused the WordPress pingback feature, which allows sites to cross-reference blog posts, to launch a large-scale, distributed denial-of-service (DDoS) attack, according to researchers from Web security firm Sucuri.
Recently released security updates for the popular Joomla content management system (CMS) address a SQL injection vulnerability that poses a high risk and can be exploited to extract information from the databases of Joomla-based sites.
Cisco Systems released new firmware versions for some of its small business routers and wireless LAN controllers in order to address vulnerabilities that could allow remote attackers to compromise the vulnerable devices or affect their availability.
Hackers found security weaknesses that allowed them to overdraw accounts with Flexcoin and Poloniex, two websites that facilitate bitcoin transactions, and exploited them to steal bitcoins from the two services. The attacks put Flexcoin out of busine...
A group of attackers managed to compromise 300,000 home and small-office wireless routers, altering their settings to use rogue DNS servers, according to Internet security research organization Team Cymru.
A new variant of the Gameover malware that steals online banking credentials comes with a kernel-level rootkit that makes it significantly harder to remove, according to security researchers from Sophos.
A mobile application designed to make it easier for RSA Conference 2014 attendees to navigate the event and interact with their peers exposes personal information, according to researchers from security firm IOActive.
Embattled Bitcoin exchange Mt. Gox is filing for bankruptcy protection with liabilities of ¥6.5 billion (US$63.6 million), according to Japanese media reports.
U.S. National Security Agency director General Keith Alexander has called on Congress to pass new legislation focused on protecting the country's cyber assets while at the same time defending his agency's cybersurveillance programs.
Fourteen prominent security and cryptography experts have signed an open letter to technology companies urging them to take steps to regain users' trust following reports over the past year that vendors collaborated with government agencies to underm...
The number of vulnerabilities found in Microsoft's Windows 7 and XP operating systems doubled last year over 2012, with the highest number of flaws reported in Windows 8, according to new research from Secunia.
Most Popular Reviews
- 1 HTC One Mini 2 android smartphone
- 2 Microsoft Surface Pro 3 Windows 8.1 tablet
- 3 Medion Akoya E4110 (MD 8239) desktop PC
- 4 Samsung Galaxy Tab S (10.5) 4G review
- 5 Dell Inspiron 11 3000 Series convertible laptop
Best Deals on GoodGearGuide
Latest News Articles
- iPhone 6 expected to fetch over $3,000 in China's grey market
- New US Senate bill aims to limit access to emails stored abroad
- Malicious advertisements distributed by DoubleClick, Zedo networks
- Apple iPhone 6 hands-on
- Google to turn on encryption by default in next Android version
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.