An all-in-one security suite that puts a focus on parental features and safe social networking
Dropcam Echo review: A live streaming camera and app that are easy to set up and access
Avira AntiVir Personal review: Great malware protection
BitDefender Antivirus Pro 2011 offers good detection of known malware
Avast Free Antivirus 5 review: This free antivirus package offers quick scan speeds
People regularly ask me, "What do you consider to be the best antivirus software currently available?"
security in pictures
Don’t think email security is important? Here are six everyday scenarios where many businesses loosely send sensitive and confidential content and files over unsecure email.
From televisions to passenger planes, even the most unassuming device can, if accessed by the wrong people, be turned into something more sinister.
These disgruntled employees show what can happen when an employer wrongs them.
Enterprises are now clamoring for the corporate security gateway to give way to the new Cloud application security gateway.
A United Nations panel has approved a resolution that would have its General Assembly call on states to respect and protect the right to privacy in the digital age.
Home Depot spent US$43 million in its third quarter dealing with the fallout of one of the largest ever data breaches, highlighting the costly nature of security failures.
Chip-and-PIN payment cards have a strong supporter in the hotbed of payment technologies, with San Francisco's district attorney promoting the new technology as a way to cut down on fraud.
Adobe released an emergency patch on Tuesday to fix a Flash Player vulnerability that was fixed last month but was quickly exploited again.
Antivirus firm Bitdefender unveiled a hardware security appliance for home networks Tuesday that aims to protect devices by scanning network traffic to detect and block potential security threats.
FreeOTFE may sound like a political bumper sticker, but it stands for "Free On The Fly Encryption." The "Free" part is self-explanatory; "On The Fly Encryption" refers to the encrypting/decrypting of data as it is written to or read from your hard di...
Many reasons exist for why you might want or need to "security wipe" a BlackBerry, or completely erase all personal data stored on your handheld: You got a new smartphone and plan to retire the older device; you're trading in your existing BlackBerry...
Today is the final Microsoft Patch Tuesday for 2010. It has been a busy year for Microsoft when it comes to security bulletins, and December is no exception as Microsoft closes out the year with a record 17 security bulletins. With only a week or so ...
A security researcher today provided a way for users to see whether their e-mail addresses and passwords were among the 1.3 million compromised in a hack of Gawker Media's sites.
Despite the convenience, free public Wi-Fi networks like those found in hotels, Starbucks, and McDonald's are also a serious risk when it comes to your data and personal information.
As tech companies increasingly rely on analyzing and selling user data to boost revenue, trust is emerging as one of the defining issues of the year for the IT sector.
After six months of contentious debate over U.S. National Security Agency surveillance programs, prompted by leaks from former government contractor Edward Snowden, the third week in December may have marked a major turning point.
Earlier in September, an update to the Google Settings app for Android tipped off that a remote device lock and password reset feature was on its way to the Android Device Manager. This week, the service finally went live for most users through the A...
Police in Austin, Texas, set up sting operations with cars they have under surveillance, watching for thieves to break into them. Marcus J. Carey's Web service, HoneyDocs -- born in the same city -- uses the same concept, only with computer files.
It's tough to keep track of all of your passwords. In spite of advances in biometrics, and increased attention on the value of two-factor authentication, passwords remain the primary means of digital security. They're also one of the weakest links in...
Whitepapers about security
With iOS 8, Apple has acknowledged the need for tighter IT controls through its addition of business-ready MDM features. But alone, they aren’t enough to meet enterprise security requirements. Get 5 tips to consider with new iOS 8 features.
Most Popular Reviews
- 1 Samsung's Galaxy Alpha review: A peek into the Galaxy S6
- 2 Lenovo Yoga 3 Pro hybrid Ultrabook
- 3 Bose SoundLink on-ear Bluetooth headphones
- 4 Apple iPhone 6 Plus: An in depth review
- 5 Medion Akoya P2214T (MD99430) hybrid laptop
Best Deals on GoodGearGuide
Latest News Articles
- UN committee calls on countries to protect right to privacy
- Kogan drops Agora 4G price, launches 4G+
- Sony to offer refunds over misleading PS Vita ads
- Grab a $49 Android tablet with your grocery shopping
- Wearable technology is more than displaying information: Jawbone
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
- FTSEO Content ExecutiveVIC
- FTAccount ExecutiveNSW
- FTStudio Design ManagerVIC
- CCTech Support | IT Services Firm - Ad hoc Projects - Echuca AreaVIC
- FTMarketing Solutions ManagerNSW
- FTStudio Design ManagerVIC
- CCStrategic Partner ManagerNSW
- FTPartnership Manager - MediaNSW
- FTChief Information Officer - CSIROACT
- FTProgram Manager - Integration & SolutionsNSW
- FTDigital Account ManagerNSW
- CCTech Support | IT Services Firm - Ad hoc Projects - Port Augusta / Whyalla AreaSA