A medical transcription company has agreed to settle a U.S. Federal Trade Commission complaint that its inadequate security measures allowed the personal information, including medical histories and examination notes, of thousands of people to be pub...
Over the past several months security researchers have found serious vulnerabilities in many mobile advertising libraries that could be exploited to abuse the permissions of Android apps or to execute unauthorized code on users' devices. The risks re...
U.S. President Barack Obama has nominated an expert cryptologist to head the National Security Agency at a time when the agency is under pressure to reform its surveillance.
A team of researchers has developed an Android app to help people better understand when their location is being accessed, something that happens more often than people think.
GoDaddy has acknowledged that one of its employees fell victim to a social engineering attack allowing a hacker to take over a customer's domain names and eventually extort a coveted Twitter user name from him. PayPal, which the victim claimed also p...
A man charged with aiding a terrorist organization has asked a U.S. court to throw out information collected by the National Security Agency, saying the NSA's surveillance of his Internet communications violates the Fourth Amendment of the U.S. Const...
Senator Patrick Leahy questioned how the Constitution allows the National Security Agency's bulk collection of U.S. telephone records and repeated his calls for President Barack Obama's administration to end the program during a hearing Wednesday.
The German government and the German Federal Intelligence Service are facing legal action because they allegedly aided the U.S. National Security Agency (NSA) data collection program.
Critics of the U.S. National Security Agency's U.S. telephone records program are missing the point when they say the agency can't point to one case where the collection was critical to preventing terrorism, two people formerly involved with the prog...
A vulnerability in Android allows malicious applications to bypass an active VPN (virtual private network) connection and force traffic from the device through an attacker-controlled system where it can be intercepted, according to security researche...
Some of the most prominent cryptography and security researchers in U.S. academia have condemned the U.S. National Security Agency's surveillance practices and called for change.
Eleven people were charged in the U.S., India, China and Romania for their suspected involvement with websites offering email hacking services.
A Romanian man was arrested this week under suspicion that he is the hacker known online as Guccifer who hacked into the online accounts of various public figures and politicians, including former U.S. Secretary of State Colin Powell and members of t...
The software used by many wireless IP cameras manufactured by Foscam Digital Technologies have a vulnerability that allows remote users to access their video streams and take snapshots without proper authentication.
The U.S. National Security Agency should abandon its collection of U.S. telephone records because the surveillance program is illegal, a government privacy oversight board said.
Most Popular Reviews
- 1 Synology DiskStation DS215j NAS device
- 2 Fitbit Charge wireless activity tracker
- 3 HP Stream 11 laptop
- 4 B&O BeoPlay A2 portable Bluetooth speaker
- 5 Acer Chromebook 11 (CB3-111)
Best Deals on GoodGearGuide
Latest News Articles
- Apple Watch to go on sale in March, claims analyst
- AT&T to acquire Nextel Mexico assets for $1.9 billion
- Facebook in Turkey ordered to block material insulting Prophet Muhammad
- Motorola returns to China, touts phone customization
- Modular smartphones could be reused as computer clusters
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.