Users of Drupal, one of the most popular content management systems, should consider their sites compromised if they didn't immediately apply a security patch released on Oct. 15.
Since 2011 a group of attackers has been targeting companies that operate industrial control systems with a backdoor program called BlackEnergy.
Russia is likely behind a long-running computer spying campaign, although the stealthy attacks leave fewer clues than other state-sponsored attacks, according to a new report from FireEye.
One of the first things a malware analyst does when encountering a suspicious executable file is to extract the text strings found inside it, because they can provide immediate clues about its purpose. This operation has long been considered safe, bu...
Many companies set up subdomains for use with external services, but then forget to disable them when they stop using those services, creating a loophole for attackers to exploit.
Apple will stop support next week for an encryption protocol found to contain a severe vulnerability, the company said on Wednesday.
Malicious advertisements made their way last week to almost two dozen popular websites and used browser-based exploits to infect computers with CryptoWall, a nasty file-encrypting ransomware program.
Microsoft has published a temporary fix for a new zero-day flaw that affects nearly all versions of Windows and is currently being exploited via PowerPoint.
If you haven't updated your Flash Player with the fixes released on Oct. 14, you may be vulnerable to new attacks using a commercial exploit kit called Fiesta, security researchers warn.
Network-attached storage (NAS) devices are riddled with vulnerabilities that can put the security of sensitive data and networks at risk, a researcher has found. To prove his point, he has created a proof-of-concept worm that can infect devices from ...
Users who are careful to download files only from trusted websites may be tricked by a new type of Web vulnerability: this one cons them into downloading malicious executable files that are not actually hosted where they appear to be.
A new technique that allows attackers to hide encrypted malicious Android applications inside images could be used to evade detection by antivirus products and possibly Google Play's own malware scanner.
A major change this year in how online advertisements are sold has been embraced by hackers, who are using advanced ad-targeting capabilities to precisely deliver malware.
Drupal has released a patch for a highly critical flaw in its content management system, which could allow rogue code to run.
Facebook is doubling the rewards it will pay for security vulnerabilities related to code that runs its advertising system, the company said Wednesday.
Most Popular Reviews
- 1 Samsung's Galaxy Alpha review: A peek into the Galaxy S6
- 2 Lenovo Yoga 3 Pro hybrid Ultrabook
- 3 Bose SoundLink on-ear Bluetooth headphones
- 4 Apple iPhone 6 Plus: An in depth review
- 5 Medion Akoya P2214T (MD99430) hybrid laptop
Best Deals on GoodGearGuide
Latest News Articles
- BlackBerry's deal to buy voice crypto company Secusmart blessed by German government
- France, Germany want EU to take a tougher stance on tech firms
- Distracted? Slap this Hitachi gizmo on your forehead to focus
- Divoom Voombox-Travel rugged Bluetooth speaker
- Uber suspends Nevada operations, affecting nearly 1,000 jobs
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
- FTStudio Design ManagerVIC
- FTPartnership Manager - MediaNSW
- FTSEO Content ExecutiveVIC
- CCTech Support | IT Services Firm - Ad hoc Projects - Port Augusta / Whyalla AreaSA
- FTAccount ExecutiveNSW
- FTDigital Account ManagerNSW
- CCTech Support | IT Services Firm - Ad hoc Projects - Echuca AreaVIC
- FTProgram Manager - Integration & SolutionsNSW