Change in any industry involves conflict. Evolution and revolution in tech this year took place not only in the marketplace but also in the courtroom, the factory, and on the Web. Here are the top news stories of 2012 as selected by the editors of th...
A new variant of a Trojan program called Reveton that prevents victims from using their computers and displays rogue messages from law enforcement agencies is using localized voice messages to trick victims into paying made-up fines, according to res...
Security researchers have identified a botnet controlled by its creators over the Tor anonymity network. It's likely that other botnet operators will adopt this approach, according to the team from vulnerability assessment and penetration testing fir...
A new piece of malicious software targeted at Apple users has been found on a website dedicated to the Dalai Lama, but one security vendor is labeling it as low risk.
Popular online social networking site Tumblr was ravaged on Monday by an Internet worm that spewed racist and inflammatory messages across thousands of user accounts.
An unknown attacker inserted malicious code into the latest version of the Piwik open-source Web analytics software after compromising the project's website on Monday.
Skype has been battling wily adversaries who are abusing the Internet calling application to direct people to scam websites, but the Microsoft-owned service says the sham calls are decreasing.
Cybercriminals are increasingly using .eu domain names in their attack campaigns, according to data from multiple security companies.
Symantec had spotted another odd piece of malware that appears to be targeting Iran and is designed to meddle with SQL databases.
South Carolina's governor faulted an outdated Internal Revenue Service standard as a contributing factor to a massive data breach that exposed Social Security numbers of 3.8 million taxpayers plus credit card and bank account data.
Security researchers from antivirus vendor Symantec have uncovered a piece of malware that uses Google Docs, which is now part of Google Drive, as a bridge when communicating with attackers in order to hide the malicious traffic.
The hacker group that recently infected Israeli police computers with the Xtreme RAT malware has also targeted government institutions from the U.S., U.K. and other countries, according to researchers from antivirus vendor Trend Micro.
A team of researchers have created a proof-of-concept piece of malware that can give attackers control of USB smart card readers attached to an infected Windows computer over the Internet.
A 16-year-old security researcher from India plans to present a malware application for Windows Phone 8 at the upcoming MalCon security conference in New Delhi, India, on Nov. 24.
The recent cyberattack that infected Israeli police computers with malware was likely part of a year-long cyberespionage operation with targets in Israel and the Palestinian territories, according to security researchers from antivirus vendor Norman.
Most Popular Reviews
- 1 HP Stream 11 laptop
- 2 B&O BeoPlay A2 portable Bluetooth speaker
- 3 Acer Chromebook 11 (CB3-111)
- 4 Asus Zenbook UX303LN Ultrabook
- 5 Samsung's Galaxy Alpha review: A peek into the Galaxy S6
Best Deals on GoodGearGuide
Latest News Articles
- Google's Gmail appears to have been blocked by China at IP level
- 'The Interview' already Sony Pictures' top online film ever
- Sony: PlayStation Network is back online now, really
- Reports: North Korea's Internet access, mobile networks down
- PlayStation Network recovering after outage
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.