A new Chrome extension highlights tools embedded in websites that could pose privacy risks by sending data unencrypted over the Internet.
U.S. lawmakers should put strict privacy controls into planned legislation to encourage companies to share cyberthreat information with government agencies and each other, some advocates said.
When operating outside of the law, you can't exactly rely on the police to protect your illegal enterprise from other criminals.
The European Commission is reportedly revving up the engines on a controversial plan to retain passenger flight data across the EU, although a prior attempt got its wings clipped due to privacy concerns.
A Canadian surveillance agency is tapping into Internet cables and analyzing up to 15 million downloads from popular file-sharing websites each day, in an effort to identify political extremists, according to a news report by The Intercept and CBC Ne...
The SilentText secure messaging application bundled with Blackphone had a serious vulnerability that would have allowed attackers to decrypt messages, read contact information, gather location data and even execute malicious code on the phone.
Samsung Electronics smartphones and tablets protected using the company's Knox security technology have been integrated with VPNs from Cisco Systems, giving enterprises more options for communicating securely.
A fault in a widely used component of most Linux distributions could allow an attacker to take remote control of a system after merely sending a malicious email.
A drive in the U.S. Congress to pass a law requiring companies with data breaches to notify affected customers may get bogged down in old arguments.
Companies developing Internet of Things (IoT) products should adopt best practices to protect the privacy and security of consumers, the U.S. Federal Trade Commission has recommended.
A vulnerability found in a DSL router model from D-Link allows remote hackers to change its DNS (Domain Name System) settings and hijack users' traffic. The issue might also affect other devices because it is located in a popular firmware used by dif...
The European Commission must soon strike a deal to regulate personal data transfers of EU citizens to the U.S., Germany's federal data protection commissioner warned, saying further delays could trigger a suspension of those transfers, with dire econ...
Mass Internet surveillance endangers fundamental human rights and has not helped to prevent terrorist attacks, a top European human rights body concluded after analyzing documents leaked by Edward Snowden in 2013.
Keylogging malware that may have been used by the NSA shares signficant portions of code with a component of Regin, a sophisticated platform that has been used to spy on businesses, government institutions and private individuals for years.
A U.S. Drug Enforcement Administration program to keep tabs on cars close to the U.S.-Mexican border has been gradually expanded nationwide and is regularly used by other law enforcement agencies in their hunt for suspects.
Most Popular Reviews
- 1 Synology DiskStation DS215j NAS device
- 2 Fitbit Charge wireless activity tracker
- 3 HP Stream 11 laptop
- 4 B&O BeoPlay A2 portable Bluetooth speaker
- 5 Acer Chromebook 11 (CB3-111)
Best Deals on GoodGearGuide
Latest News Articles
- Office for Android now widely available, with new Outlook apps in tow
- AllSeen IoT group acts to head off patent wars
- The Upload: Your tech news briefing for Thursday, January 29
- Intel wants to banish cables, connectors with new Broadwell chips
- Apple hits Samsung at home, where it hurts
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.