It's been over two weeks since the DNS Security Extensions (DNSSEC) system was turned on for .com domain names. This is an end stage for a process that will one day let surfers be 100 percent confident they're accessing the site they think they are, ...
People who make a lot of online transactions, are popular online and who respond to most of the emails they receive are at the highest risk for being duped by malicious phishers, according to a multi-university study.
A local security expert is dumbfounded by the ease in which a fake <i>Twilight: Breaking Dawn</i> game application has spread across Facebook, and has warned Australians to be less trusting when it came to approving applications on the social network...
Google on Tuesday said it will add malware download warnings to its Chrome browser.
Security vendor Fortinet has hit back against tests by NSS Labs that showed one of its high-end firewalls along with products from other vendors could be hacked using a 'TCP split handshake attack'.
A press feeding frenzy followed the somewhat vague April Fools Day announcement by Epsilon Data Management that someone had hacked into its systems and stolen a bunch of email addresses. The addresses were of people who had "opted in" for email marke...
A test by NSS Labs that found firewalls from five vendors are subject in one way or another to remote exploit by hackers has ignited furious response from vendors Fortinet and SonicWall.
Apparently, NSS Labs struck a nerve. NSS Labs revealed that almost all of the firewalls it tested for a recent report are susceptible to crash or compromise using common attacks. The firewall vendors in question, though, beg to differ and take except...
A new week, a new rash of attacks against security vendors, email marketers and banks. It would be easy to point fingers and laugh at the irony, especially in the case of security vendors, but that would be both petty and shortsighted.
Microsoft on Tuesday beefed up security in Office 2003 and Office 2007 on Windows by adding a feature that first appeared in the newer Office 2010 last year.
The U.S. Department of Justice and U.S. Federal Bureau of Investigation have obtained a temporary restraining order allowing them to disrupt a computer virus that created an international botnet controlling more than 2.3 million computers as of early...
A privacy activist plans to ask for a judicial review of British prosecutors' decision not to bring a case against BT and the online advertising company Phorm for running secret trials of a system that monitored peoples' Internet use without their co...
Organisations could dramatically cut their exposure to vulnerabilities in Microsoft software simply by limiting Windows admin rights.
One of the big advantages of using Linux is that its security tends to be so much better than that of the competing alternatives.
Some of the most commonly-used firewalls are subject to a hacker exploit that lets an attacker trick a firewall and get into an internal network as a trusted IP connection.
Most Popular Reviews
- 1 Apple iPhone 6 Plus: An in depth review
- 2 HTC One Mini 2 android smartphone
- 3 Oppo Find 7 Android smartphone
- 4 Medion Akoya MD99410 (E1232T) touchscreen laptop
- 5 HTC Desire 610 smartphone
Best Deals on GoodGearGuide
Latest News Articles
- Alcatel-Lucent sells enterprise networking unit to China Huaxin
- Hacked celebrities 'dumb', says proposed EU digital commissioner
- Fujitsu to design Japanese exascale supercomputer
- Intel pushes factory IoT with $9 million cost savings at plant
- Malware program targets Hong Kong protesters using Apple devices
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.