Specialized servers used by many ISPs to manage routers and other gateway devices provisioned to their customers are accessible from the Internet and can easily be taken over by attackers, researchers warn.
A security audit of 10 popular Internet-connected devices - components of the so-called Internet of Things - identified an alarmingly high number of vulnerabilities.
The Russian Ministry of Interior is willing to pay 3.9 million roubles, or around US$111,000, for a method to identify users on the Tor network.
A critical vulnerability found recently in a popular newsletter plug-in for WordPress is actively being targeted by hackers and was used to compromise an estimated 50,000 sites so far.
Six people have been indicted on charges of running an international ring that resold tickets bought through compromised StubHub accounts for some of New York's biggest concerts and sporting events.
Developers of Tor software believe they've identified a weakness that was scheduled to be revealed at the Black Hat security conference next month that could be used to de-anonymize Tor users.
Advocacy group the Electronic Frontier Foundation wants to address the poor security track record of home routers with a new firmware project that will encourage users to share their Internet connection publicly by setting up guest Wi-Fi networks.
Researchers are gearing up to hack an array of different home routers during a contest next month at the Defcon 22 security conference.
A new Trojan program designed to steal log-in credentials and other financial information from online banking websites is being advertised to cybercriminal groups on the underground market.
Oracle has dispelled rumors that the upcoming security update for Java 7 and those it will release in the future might not work on Windows XP.
Microsoft updated the Certificate Trust List in Windows to revoke trust for a certificate authority operated by the Indian government after it improperly issued at least 45 SSL certificates for domains owned by Google and Yahoo.
Cybercriminals are trying to create a new botnet based on what is likely a modification of Gameover Zeus, a sophisticated Trojan program whose command-and-control infrastructure was taken over by law enforcement agencies at the beginning of June.
The scope of a recent security breach at a digital certificate authority (CA) controlled by the Indian government is bigger than initially thought and also targeted domain names owned by Yahoo, in addition to several owned by Google.
Implementation issues with AVG Secure Search, a browser toolbar from antivirus vendor AVG Technologies that's supposed to protect users from malicious websites, could have allowed remote attackers to execute malicious code on computers.
Attackers injected malicious code into Dailymotion.com, a popular video sharing website, and redirected visitors to Web-based exploits that installed malware.
Most Popular Reviews
- 1 Motorola Moto G (2nd Gen.) android smartphone
- 2 HTC One Mini 2 android smartphone
- 3 Microsoft Surface Pro 3 Windows 8.1 tablet
- 4 Medion Akoya E4110 (MD 8239) desktop PC
- 5 Samsung Galaxy Tab S (10.5) 4G review
Best Deals on GoodGearGuide
Latest News Articles
- Cheap Windows 8.1 tablet to be available from Target
- Motorola Moto X and 360: On sale in Australia, October
- Lenovo to cough up $100 refunds, $250 vouchers to settle IdeaPad suit
- Ericsson acquires majority stake in Apcera for cloud policy compliance
- Delve, Office Graph must transcend Office 365 to be revolutionary
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.