Verizon's just-released "2011 Data Breach Investigations Report" says businesses could prevent most data breaches if they stick to security principles that are cheap and easy to implement.
Criminals carried out more but smaller data thefts last year than in previous years, indicating a shift toward simpler exploits that run lower risk of punishment, according to Verizon's latest data breach report.
India's Election Commission is considering introducing paper trails to its electronic voting machines (EVMs), following criticism that the machines could be tampered with.
As smartphones have grown more powerful and complex, so have the threats against them.
In a move that is unlikely to win it any new friends in the privacy community, Yahoo has announced that it will retain consumer search data for a substantially longer period of time than it does today.
Authorities in South Korea are probing a large system failure at a popular bank, trying to determine whether the incident was an error or a cybercrime that could be repeated elsewhere in the country where business leans largely on electronic transact...
Glenn Phillips, president of Pelham, Ala.-based Forté, says that the dedicated Windows workstations his company sells to hospital emergency room administrators must not only be secure, but absolutely tamperproof as well. After all, lives depend on th...
When Google admitted last year that it had been targeted by sophisticated hackers, possibly from China, it introduced a new term into the high technology lexicon -- the advanced persistent threat. These attacks are sophisticated, targeted, and almost...
This week, a $12 billion maker of network connectors and panels will unveil a chipset to provide greater security and visibility in data center networks.
A DIY guide to securing Android-based devices
We have a major problem, which explains why I'm sitting in an airport right now. I'm heading off to visit some third parties that develop portions of our software for us.
Open-source security company Sourcefire has announced an entry-level Intrusion Prevention System (IPS) it claims will democratize a technology that is still seen as being exclusively for large companies with experienced security teams, rather than sm...
An anonymous hacker who claimed to have broken into monitoring systems at a New Mexico wind turbine facility made the whole thing up, security experts said Monday.
The European Union's data retention law has come under scrutiny, with a new report saying that it poses significant risks to individuals' right to privacy.
One day after a hacker posted screen shots and data to a hacking mailing list, saying he had broken into a New Mexico wind turbine facility, the company that runs the turbines says it has seen no evidence of a computer intrusion.
Latest News Articles
- The Pirate Bay makes searching for torrents easier on mobile devices
- Apple faces privacy suit following Chinese TV report
- New guide aims to remove the drama of reporting software flaws
- Yamaha TSX-B232 desktop stereo review
- 'Canvas fingerprinting' tracking is sneaky but easy to halt
Most Popular Articles
- 1 What's the difference between an Intel Core i3, i5 and i7?
- 2 Laser vs. inkjet printers: which is better?
- 3 Windows 7 Home Premium vs. Windows 7 Professional
- 4 How to play DVD movies on your Nintendo Wii
- 5 How do I connect my TV to the Internet?
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Best Deals on GoodGearGuide
- Notebooks View all »
- 57% off $29.95
- $960 free shipping
- 14% off $679.95
- Tablets View all »
- Mobile Phones View all »
- TVs View all »
- Digital Cameras View all »