The SilentText secure messaging application bundled with Blackphone had a serious vulnerability that would have allowed attackers to decrypt messages, read contact information, gather location data and even execute malicious code on the phone.
Adobe Systems started pushing a critical Flash Player patch to users who have auto-update enabled over the weekend in order to fix a vulnerability that has been exploited by attackers since last week.
Emergency updates for Flash Player released Thursday fix a vulnerability that is actively exploited by attackers, but leave a separate one unpatched.
A critical vulnerability in popular software development collaboration products by Atlassian allows attackers to compromise servers.
Oracle released new security updates for Java to fix 19 vulnerabilities and disable default support for SSL 3.0, an outdated version of the secure communications protocol that is vulnerable to attacks.
Oracle's monster batch of security updates will include a fix for a serious misconfiguration issue in its E-Business Suite product that can give hackers access to databases full of sensitive business records.
The number of exploit kits on the Web dramatically decreased last year, but some have become more sophisticated and shifted their focus to software that is less frequently updated.
Adobe Systems fixed nine vulnerabilities in Flash Player that allow attackers to record users' keystrokes or take complete control of their computers.
he January 2015 edition of Microsoft Patch Tuesday might be more notable for what the monthly release of security bulletins does not contain -- there are no fixes for the Microsoft Explorer browser this month.
Google released details of a second unpatched privilege escalation flaw in Windows 8.1 in less than a month, drawing criticism from Microsoft.
Server administrators are advised to upgrade OpenSSL again to fix eight new vulnerabilities, two of which can lead to denial-of-service (DoS) attacks.
In today's world of agile software development and fast release cycles, developers increasingly rely on third-party libraries and components to get the job done. Since many of those libraries come from long-running, open-source projects, developers o...
An open-source component used to display PDF files on WikiLeaks.org and other websites contains vulnerabilities that could be exploited to launch cross-site scripting (XSS) and content spoofing attacks against visitors.
Remote code execution vulnerabilities in the standard implementation of the network time protocol (NTP) can be exploited by attackers to compromise servers, embedded devices and even critical infrastructure systems that run UNIX-like operating system...
A critical vulnerability in client software used to interact with Git, a distributed revision control system for managing source code repositories, allows attackers to execute rogue commands on computers used by developers.
Most Popular Reviews
- 1 Synology DiskStation DS215j NAS device
- 2 Fitbit Charge wireless activity tracker
- 3 HP Stream 11 laptop
- 4 B&O BeoPlay A2 portable Bluetooth speaker
- 5 Acer Chromebook 11 (CB3-111)
Best Deals on GoodGearGuide
Latest News Articles
- VPN providers play 'cat-and-mouse' with China's growing censorship
- Telstra Wi-Fi 4G Advanced II wireless modem review
- Canon PIXMA MG7560 All-In-One Cloud printer
- Facebook tests delivering tips about your location
- How three small credit card transactions could reveal your identity
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.