Several underground marketplaces are offering full information packages for sale that contain verified health insurance credentials, bank account numbers, Social Security numbers and other personal information, along with counterfeit physical documen...
Trend Micro says it detected a targeted attack that sent malware-laden emails to representatives of 16 European countries and some Asian governments.
A new version of a file-infecting malware program that's being distributed through drive-by download attacks is also capable of stealing FTP (File Transfer Protocol) credentials, according to security researchers from antivirus firm Trend Micro.
A second vulnerability that can be exploited to modify legitimate Android apps without breaking their digital signatures has been identified and publicly documented.
Paying rewards to independent security researchers for finding software problems is a vastly better investment than hiring employees to do the same work, according to researchers from the University of California Berkeley.
Of the six critical security bulletins Microsoft issued in its Patch Tuesday monthly release of software updates, three address a vulnerability in how Microsoft software renders fonts.
Technical details and a proof-of-concept exploit have been published for a recently announced Android vulnerability that potentially affects millions of devices and allows attackers to turn legitimate apps into Trojan programs.
A noisy malware campaign against South Korea is revealing deeper secrets.
China saw an increase in Trojan and botnet attacks coming from other countries in 2012, as the amount of mobile malware in the country also surged, according to a local security group.
A persistent, widespread malware campaign that utilizes compromised Apache servers is locking users' computers and demanding a fee of US$300 to free their data.
A vulnerability that has existed in Android for the past four years can allow hackers to modify any legitimate and digitally signed application in order to transform it into a Trojan program that can be used to steal data or take control of the OS.
A simple piece of malicious software is circulating that steals Litecoins, a virtual currency based on the Bitcoin system.
Two malicious software programs that help each other stay on computers are proving difficult to remove.
A new piece of malware designed to delete files from hard disk drives and render computers unable to boot targets South Korean users, according to researchers from security firm Symantec.
A new variant of the Citadel financial malware uses in-browser injection techniques combined with extensive content localization to steal log-in credentials and credit card information from users in different countries, according to researchers from ...
Most Popular Reviews
- 1 Bose SoundLink on-ear Bluetooth headphones
- 2 Apple iPhone 6 Plus: An in depth review
- 3 Medion Akoya P2214T (MD99430) hybrid laptop
- 4 HTC One Mini 2 android smartphone
- 5 Oppo Find 7 Android smartphone
Best Deals on GoodGearGuide
Latest News Articles
- Order the OnePlus One from Australia
- Symantec sees rise in high-traffic DDoS attacks
- Industry can head off IoT privacy rules, former US official says
- Microsoft discloses zero-day flaw, publishes quick fix
- Yahoo squeezes out some growth
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
- FTMarketing Communications Operations Manager - Global Tech Market leaderNSW
- FTBusiness development manager - retargettingNSW
- FTBusiness Development Manager | Sales ManagerNSW
- FTBusiness ManagerNSW
- FTTechnical Marketing ManagerNSW
- FTAccount ExecutiveNSW
- FTSales Account ExecutiveNSW
- FTPartner Marketing Communications Manager - Leading Global Tech BrandNSW
- FTDigital Account ExecutiveNSW
- CCConsumer Product Marketing ManagerNSW