Using the "less" Linux command to view the contents of files downloaded from the Internet is a dangerous operation that can lead to remote code execution, according to a security researcher.
Malware that Symantec says was probably developed by a nation state may have been used for as long as eight years, a length of time that underscores the challenges the security industry faces in detecting advanced spying tools.
Symantec researchers have identified a particularly sophisticated piece of malware, called "Regin" that was likely developed by a nation state and has been used to spy on governments, infrastructure operators, businesses, researchers and individuals ...
Government officials in the US and the UK are warning people to secure their webcams after websites that broadcast the contents of those cameras have sprung up online.
Attackers have started using the Citadel Trojan program to steal master passwords for password management applications and other authentication programs.
A free tool released Thursday allows users to scan their computers for surveillance malware that has been used in attacks against journalists, human rights defenders and political activists around the world.
An Android Trojan program that's behind one of the longest running multipurpose mobile botnets has been updated to become stealthier and more resilient.
Cybercriminals behind a new ransomware program called CoinVault are trying out a new psychological tactic to convince users to pay up -- freebies.
Attacks that exploit the Shellshock vulnerabilities recently patched in the Bash Unix deliver a malware program that tries to compromise systems running BusyBox, a collection of Unix utilities typically used on embedded devices like routers.
A malware program distributed recently through a rogue server on the Tor anonymity network was also used in targeted attacks against European government agencies.
Beijing police have arrested three people suspected of developing the "WireLurker" malware that may have infected as many as hundreds of thousands of Apple users.
On the coffee table was a message etched in powder, presumably cocaine: "I really miss you."
Android users in Melbourne’s CBD are the most at risk sector of the community for malware threats according to a report released by F-secure.
AV vendors, in fierce competition for users, should remember that cooperation is key in fighting malware, a top Microsoft security official said Friday.
For the first time since Stuxnet was discovered in 2010, researchers have publicly named the worm's original victims: five Iranian companies involved in industrial automation.
Most Popular Reviews
- 1 Synology DiskStation DS215j NAS device
- 2 Fitbit Charge wireless activity tracker
- 3 HP Stream 11 laptop
- 4 B&O BeoPlay A2 portable Bluetooth speaker
- 5 Acer Chromebook 11 (CB3-111)
Best Deals on GoodGearGuide
Latest News Articles
- Androids will greet guests at Japanese smart hotel
- Wi-Fi growth set to drive sales of new Ethernet speeds
- Flying high, Apple readies Watch to ship in April
- Windows 10 Spartan browser will get extensions
- 'Ghost' vulnerability poses high risk to Linux distributions
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.