YouTube has thousands of videos promoting compromised credit card numbers, with the site sometimes running advertisements for legitimate credit cards or retail outlets alongside the hacker videos, according to a new report from an online safety group...
Victims of Simplocker, the first file-encrypting ransomware threat for Android devices, can recover files without paying cybercriminals because the malicious program uses a hardcoded encryption key.
A project launched by CloudFlare, a provider of website performance and security services, allows organizations engaged in news gathering, civil society and political or artistic speech to use the company's distributed denial-of-service (DDoS) protec...
A new Trojan program that can spy on victims, steal login credentials and interfere with browsing sessions is being sold on the underground market and might soon see wider distribution.
Users can test by simply visiting a Web page if their computers have been infected with Gameover Zeus, a sophisticated online banking Trojan that law enforcement officers temporarily disrupted last week.
A newly discovered vulnerability that allows spying on encrypted SSL/TLS communications has been identified and fixed in the widely used OpenSSL library.
Responding to reports that it fails to encrypt the majority of its email traffic, Comcast said that it will ramp up domain-to-domain encryption efforts over the next few weeks.
Customers of storage and networking equipment manufacturer Buffalo who downloaded certain files from the company's website in Japan last week might have had their computers infected with an online banking Trojan.
The recent effort to disrupt the Gameover Zeus botnet includes plans for Internet service providers to notify victims, but some security researchers think ISPs should play an even bigger role in the future by actively quarantining infected computers ...
A serious vulnerability that could be exploited to crash TLS clients and potentially execute malicious code on underlying systems was patched in the popular GnuTLS cryptographic library.
Many WordPress websites could be at risk of compromise if their administrators don't upgrade a popular search engine optimization (SEO) plug-in to a newly released version that fixes serious vulnerabilities.
Someday, if you use your non-dominant hand to control your mouse or touchpad when you're say, shopping online, websites might interpret your irregular scrolling and clicking as a sign of fraud and require you to prove your identity, thanks to an IBM ...
A new computer Trojan that targets users of 450 financial institutions from around the world appears to borrow functionality and features directly from the notorious Zeus and Carberp malware programs.
Attackers are increasingly abusing devices configured to publicly respond to SNMP (Simple Network Management Protocol) requests over the Internet to amplify distributed denial-of-service attacks.
Law enforcement agencies in 111 countries collaborated to disrupt thousands of online pharmacies in what Interpol claims was the largest ever global operation targeting organized criminal networks that sell fake medicines.
Most Popular Reviews
- 1 HP Stream 11 laptop
- 2 Acer Chromebook 11 (CB3-111)
- 3 Asus Zenbook UX303LN Ultrabook
- 4 Samsung's Galaxy Alpha review: A peek into the Galaxy S6
- 5 Lenovo Yoga 3 Pro hybrid Ultrabook
Best Deals on GoodGearGuide
Latest News Articles
- US rejects North Korea offer to investigate Sony hack, reaches out to China
- North Korea wants joint probe into Sony hack, warns of consequences if not
- Staples says hack may have compromised 1 million-plus payment cards
- Judge questions evidence on whether NSA spying is too broad
- Three ways enterprise software is changing
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.