Hotmail accounts were recently targeted by an attacking against a zero-day vulnerability in the Microsoft Webmail system. The attack is more insidious than some because it executes without user intervention when a malicious email is opened.
I didn't expect to get a ticket to the rapture, but judging from the lack of abandoned vehicles it seems that the rumors of the end of the world were a bit exaggerated. However, even though the world did not come crashing to a halt today, don't let ...
Mac Defender is turning out to be somewhat of an epidemic that neither Apple, nor Mac users seem prepared for. The Mac malware has caught the Apple ecosystem off guard and threatens to shatter the reality distortion field that Apple thrives on.
Mac users don't have to worry about malware, right? Well, for many years that's been true, although the reasons were always the topic of contentious debate between the Apple faithful and various security researchers, many of whom predicted Mac securi...
Israel is setting up a national task force to expand the state's ability to defend vital infrastructure networks from cyberterrorist attacks by foreign countries and terrorist elements, according to a <a href="http://www.pmo.gov.il/PMOEng/Communicati...
There are phishing scams out there targeting Adobe users. Make sure you know how to recognize and avoid these threats when they arrive in your Inbox.
Security researchers revealed a dangerous exploit in Skype for Mac which can be exploited to create a worm that can take control of Mac PCs. This FAQ will help you understand the potential impact of the threat, and what you can do to protect your sys...
Attackers are now using Google's image search to distributed malware, security experts say. Thousands of sites have reportedly been compromised by code injection -- the malicious code redirects users to fake antivirus applications.
The death of Osama bin Laden, the dramatic events surrounding the military operation against bin Laden's compound in a posh Pakistani suburb, and the resulting conspiracy theories and fear of retaliatory attacks from Al Qaeda are all very popular top...
Malware creators are already using the news of Osama Bin Laden's death as a opportunity to try and dupe people into clicking on malicious links. According to cloud-security firm Zscaler, researchers were already seeing malicious sites emerge to capit...
The Pakistani programmer who dubbed himself "the guy who liveblogged the Osama raid without knowing about it" is also the guy who got his website hacked without knowing about it.
The announcement late Sunday of the death of al-Qaeda leader Osama bin Laden has set the Internet abuzz, as users searched for information and shared their thoughts on the killing of one of the world's most wanted men.
Iran claims to have discovered new malware it is calling the Stars worm attacking the nation's critical infrastructure. But, the lack of any sample of the new threat make many security experts skeptical.
While a company can do everything possible for its own network security, in the age of e-commerce and online banking that's not enough.
Apple released yet another update to iOS this week. iOS 4.3.2 is the second incremental update for iOS in a matter of weeks following the launch of iOS 4.3. Like any incremental update, iOS 4.3.2. contains its share of minor tweaks and fixes, but iOS...
Most Popular Reviews
- 1 HTC One Mini 2 android smartphone
- 2 Microsoft Surface Pro 3 Windows 8.1 tablet
- 3 Medion Akoya E4110 (MD 8239) desktop PC
- 4 Samsung Galaxy Tab S (10.5) 4G review
- 5 Dell Inspiron 11 3000 Series convertible laptop
Best Deals on GoodGearGuide
Latest News Articles
- IEEE standards group wants to bring order to IoT
- InfiniDB going out of business, but its database will live on as open source
- FCC questions how to enforce net neutrality rules
- SAP CEO Bill McDermott on why Concur is worth $8.3 billion
- Alibaba shares open at a high $92.70
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.