After Raytheon began selling missiles to Taiwan in 2006, the defense company's computer network came under a torrent of cyberattacks.
The Zeus financial malware has been updated with P-to-P (peer-to-peer) functionality that makes it much more resilient to take-down efforts and gives its controllers flexibility in how they run their fraud operations.
Sony has suspended 93,000 user accounts on several of its gaming and entertainment networks after unauthorized login attempts on those accounts, it said Wednesday.
More and more enterprise IT shops - as they get comfortable with virtualization practices in their own private clouds - are considering a jump to the public cloud. But before making that leap, consider these pieces of advice from those that have alre...
Startup Nukona is taking a different tack from mobile virtualization advocates when it comes to securing and managing apps, introducing a "wrapper" for individual apps in which enterprises can apply a specific set of policies for each one.
Zero-day exploits are nerve-racking for IT professionals but are far less dangerous than unpatched older vulnerabilities for which fixes are available, Microsoft says.
Mobile phones will become an increasing menace to network security that could drop malware onto protected devices when they dock to sync or plug into USB ports to charge, security experts say in a Georgia Tech report.
Many top websites share their visitors' names, usernames or other personal information with their partners without telling users and, in some cases, without knowing they're doing it, according to a new study from Stanford University.
Microsoft undertook a sizable data migration project following Japan's earthquake in March, fearing that one of its data centers could become dysfunctional because of aftershocks.
Peer-to-peer software developer Frostwire has agreed to settle U.S. Federal Trade Commission charges that its software would likely cause users to unknowingly share sensitive personal files, including pictures, from their Android devices, the FTC sai...
Officials in a number of German state governments have owned up to using the Quellen-TKÜ Trojan Horse software in criminal investigations to intercept encrypted telecommunications on PCs. At least one state said it has suspended use of the software, ...
Finnish security firm Stonesoft claims to have developed 163 new attack methods that can evade network intrusion detection and prevention systems (IDPS) over multiple communication protocols including IPv4, IPv6, TCP and HTTP.
Six weeks after EMC's RSA security division saw its SecurID system hit by hackers, RSA president Tom Heiser met with the CIO of a large global medical device company.
The website of the New York Stock Exchange slowed down significantly twice on Monday afternoon, the day when the hacker group Anonymous was scheduled to launch a DDoS (distributed denial-of-service) attack on the website, according to an Internet an...
Good Technology is opening up its technology platform so that enterprises and third-party developers can build secure mobile applications running on its infrastructure.
Most Popular Reviews
- 1 Synology DiskStation DS215j NAS device
- 2 Fitbit Charge wireless activity tracker
- 3 HP Stream 11 laptop
- 4 B&O BeoPlay A2 portable Bluetooth speaker
- 5 Acer Chromebook 11 (CB3-111)
Best Deals on GoodGearGuide
Latest News Articles
- Mass surveillance 'endangers fundamental human rights,' says study
- Developers begin work on LibreOffice for Android
- The Upload: Your tech news briefing for Tuesday, January 27
- Computer simulation eases real-world Chinese traffic jams
- Link between NSA and Regin cyberespionage malware becomes clearer
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.