Cybercrooks have hit on a new twist to their aggressive marketing of fake security software, and are duping users into downloading a file utility that holds users' data for ransom, security researchers warned Wednesday.
With China's economy cooling down, some of the country's IT professionals are turning to cybercrime, according to a Beijing-based security expert.
She may be just about to turn 10, but the Melissa virus has given birth to many children since she was born on March 26, 1999.
Computer security researchers have devised a new Twitter attack that they say could spread virally, much like a worm on the microblogging service.
Perhaps as many as ten million PCs are infected with sneaky programs designed to steal sensitive financial information, antivirus vendor Panda Security reports.
Hackers have discovered a new way to steal your money: texting it out of your phone.
US President Barack Obama ran a successful Web 2.0 campaign last year. Now, as president, he's got to deal with a very Web 2.0 problem: hackers abusing the social-networking features of his Web site.
The worm that's infected millions of Windows PCs is a "very well-engineered" piece of malware, according to one security expert. But researchers still have no clear idea what the hackers plan to do with the collection of computers they've compromised...
The worm that has infected several million Windows PCs is causing havoc because nearly a third of all systems remain unpatched 80 days after Microsoft rolled out an emergency fix, a security expert said Thursday.
Hackers have seeded LinkedIn, the business networking service, with bogus celebrity profiles that link to malicious sites serving up attack code, a security researcher said Wednesday.
For the second year in a row, some of those digital photo frames lying under the Christmas tree may come with a nasty surprise.
New malware is spreading via Christmas and holiday greetings, security researchers said last week, a tactic reminiscent of those used last season by the notorious Storm Trojan horse.
The scammers began to see serious problems with their phishing scams sometime around April.
Step 1: Identify a computer virus specimen. Step 2: Create a "signature" to detect and eradicate the virus, and push the signature file out to a computer. Step 3: Repeat steps 1 and 2 again and again for new viruses and their variants.
Computer users are their own worst enemies, a security company warned Monday as it released data that showed software bugs were the source of just 5 percent of the year's infections.
Most Popular Reviews
- 1 HTC One Mini 2 android smartphone
- 2 Microsoft Surface Pro 3 Windows 8.1 tablet
- 3 Medion Akoya E4110 (MD 8239) desktop PC
- 4 Samsung Galaxy Tab S (10.5) 4G review
- 5 Dell Inspiron 11 3000 Series convertible laptop
Best Deals on GoodGearGuide
Latest News Articles
- IEEE standards group wants to bring order to IoT
- InfiniDB going out of business, but its database will live on as open source
- FCC questions how to enforce net neutrality rules
- SAP CEO Bill McDermott on why Concur is worth $8.3 billion
- Alibaba shares open at a high $92.70
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.