Microsoft yesterday urged users of older Office suites to install and run a complicated tool to protect themselves against ongoing attacks exploiting an unpatched bug in Adobe's Flash Player.
It's no secret that the goal of modern malware writers is to create attack software that is stealthy and flows undetected for as long a period of time as possible. What's increasingly startling, however, is how pervasive custom malware has become as ...
Security firm Sophos is warning that a new scam is spreading virally on Twitter, and that a significant number of people have already fallen for it.
Something like this has happened to all of us lately: You shop for a watch for a friend's birthday and for a week afterwards every site you visit features ads for watches. It seems like everyone from Google on down is tracking where we go and what we...
The relatively scant information released by EMC's RSA security group on Thursday in connection with the theft of SecurID authentication technology code is fueling considerable speculation about the nature of the breach and its impact on enterprises.
Too many organisations do not have comprehensive compliance policies in place for its use, according to Gartner.
The adult entertainment industry now has a home on the Internet: It's called .xxx.
The intrusion by hackers of security giant RSA, a unit of EMC, has left customers and analysts wondering if it is still safe to use millions of the one-time passcode tokens used to log into enterprise IT systems.
For more than 24 hours this week, it was a question that very few security experts could answer: Who had knocked the world's worst spam botnet offline?
EMC's RSA Security division says the security of the company's two-factor SecurID tokens could be at risk following a sophisticated cyber-attack on the company.
EMC issued a warning today that hackers have stolen information about its RSA SecurID two-factor authentication that could be used by cybercriminals to more easily breach customers' systems,
Whenever the topic of security is mentioned in the context of cloud computing, it is usually discussed as the "big barrier" to adoption. The perceived or actual lack of security in the cloud makes it impossible for businesses to make the leap into th...
A second review of the controversial Terrorist Finance Tracking Program (TFTP) has done little to allay European parliamentarians' fears of poor data security.
A large network of hacked computers called Rustock, which was responsible for a great volume of spam, has shut down, perhaps as a result of another coordinated take down by security researchers.
A new phishing scam that targets bank and PayPal passwords and other consumer data that criminals use to loot private accounts is designed to beat security built in to Firefox and Chrome Web browsers.
Most Popular Reviews
- 1 LG G3 review
- 2 MiPad: Xiaomi's first tablet reviewed
- 3 Asus G550JK gaming notebook
- 4 TP-Link Archer D7 AC1750 Wireless Modem Router
- 5 Nokia Lumia 635 review
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Latest News Articles
- Obama signs cellphone unlocking bill
- Microsoft sues Samsung, says it stopped paying for patents
- Judge approves Apple e-books price-fixing settlement
- HP's SlateBook 14 Android laptop ships, but with a higher price than expected
- Train robots hands-on to dump trash with this new OS
Best Deals on GoodGearGuide
- Notebooks View all »
- 57% off $29.95
- $22.12 free shipping
- 65% off $9.39 free shipping
- Tablets View all »
- Mobile Phones View all »
- TVs View all »
- Digital Cameras View all »