Twitter users in the Netherlands are being targeted by a piece of malware that hijacks their accounts, according to security vendor Trusteer.
Even though the majority of data breaches continue to be the result of financially motivated cybercriminal attacks, cyberespionage activities are also responsible for a significant number of data theft incidents, according to a report that will be re...
Researchers from security firm Trusteer have found a new variant of the Gozi banking Trojan program that infects a computer's Master Boot Record (MBR) in order to achieve persistence.
A Russian porn site is delivering malware that uses the victims' computers to mine bitcoins, according to research from ThreatTrack Security.
Security researchers from Russian cybercrime investigations company Groub-IB have recently identified a new piece of malware designed to steal login credentials from specialized software used to trade stocks and other securities online.
Cybercriminals are increasingly targeting small businesses due to their less sophisticated defenses, according to a new report from Symantec.
A review of poker applications shows that many suffer security flaws, putting players at risk of attack, according to a Malta-based security company.
Security researchers from Kaspersky Lab have identified a spam message campaign on Skype that spreads a piece of malware with Bitcoin mining capabilities.
Organizations face malware-related events that bypass traditional defense technologies on their networks every three minutes, according to a new report released Wednesday by security vendor FireEye.
Researchers from security vendor FireEye have uncovered a new APT (advanced persistent threat) that uses multiple detection evasion techniques, including the monitoring of mouse clicks, to determine active human interaction with the infected computer...
An analysis of a piece of Android spyware targeting a prominent Tibetan political figure suggests it may have been built to figure out the victim's exact location.
The authors of police-themed ransomware have started using the browsing histories from infected computers in order to make their scams more believable, according to an independent malware researcher.
A global credit card fraud network was shut down on Thursday as the result of an international police operation called "Pandora-Storm" that saw the participation of 20 law enforcement agencies from Europe, America and Australia, Europol announced,
A new piece of malware that infects point-of-sale (POS) systems has already been used to compromise thousands of payment cards belonging to customers of U.S. banks, according to researchers from Group-IB, a security and computer forensics company bas...
A piece of malicious software spotted by Trend Micro uses the note-taking service Evernote as a place to pick up new instructions.
Most Popular Reviews
- 1 Medion Akoya E4110 (MD 8239) desktop PC
- 2 Samsung Galaxy Tab S (10.5) 4G review
- 3 Dell Inspiron 11 3000 Series convertible laptop
- 4 Kogan Agora 4G review
- 5 Motorola Moto E review
Best Deals on GoodGearGuide
Latest News Articles
- Report: Amazon building ad system to compete with Google's
- Airbnb to reveal 124 New York hosts to attorney general
- US warns 'significant number' of major businesses hit by Backoff malware
- HP loses its leader on NFV, a key carrier network trend
- Google acquires Gecko Design for next-generation products
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
- FTMachine Learning | JAVA | San Fran based global Company | SydneyNSW
- FTMarketing Communications Executive - B2BNSW
- CCL2 Technical Support Engineer - RightFax/MessagingVIC
- FTAccount Manager Programmatic Trading DeskNSW
- FTChief Information OfficerNSW
- FTSearch Account ManagerNSW
- FTInformation Services ManagerNZ