Stuxnet infected its first target just 12 hours after hackers finished the worm, an indication that the malware scored an almost instant bulls-eye, a researcher said today.
Popular mobile games such as Angry Birds and Monkey Jump are being illegally copied and repackaged with code designed to steal personal information or perform other malicious functions, according to a study due to be released soon from Lookout Mobile...
Motorola Mobility said on Monday that it has bought 3LM, a company that develops enterprise security and device management products for Android devices.
I've said it before and I'll say it again.This will be the year of the hacker --- or rather, the year hacking goes mainstream.
Hoping to make Android more attractive to security-minded CIOs, Samsung has added encryption and integrated Cisco's AnyConnect VPN client on its latest smartphone, the Galaxy S II, it said on Sunday at the Mobile World Congress.
Researchers at Symantec today said that the notorious Stuxnet worm targeted five separate organizations, and that attacks against those objectives -- all with a presence in Iran -- started in June 2009, more than a year before independent experts rai...
Microsoft's release candidate for Internet Explorer 9 -- made available for download this week -- includes a tool that lets users protect themselves from being tracked on the Web. During his recent trip to Germany, we sat down with Dean Hachamovitch,...
A handful of vendors have begun rolling out new technologies designed to let companies take advantage of cloud computing environments without exposing sensitive data.
Israeli company Trusteer is taking its Rapport secure browsing technology into mobile security for the first time, announcing a smartphone and tablet protection system for businesses, Secure Web Access.
Google is developing a set of extensions for Java that should aid in better securing Java programs against buffer overflow attacks.
Google will offer its hundreds of millions of users the option of adding a second verification step when signing into their accounts, to complement the existing password-only authentication mechanism.
Chinese hackers working regular business hours shifts stole sensitive intellectual property from energy companies for as long as four years using relatively unsophisticated intrusion methods in an operation dubbed "Night Dragon," according to a new r...
Researchers in Germany say they've been able to reveal passwords stored in a locked iPhone in just six minutes and they did it without cracking the phone's passcode.
A considerable number of Facebook and Google users worry about privacy and malware when using the social networking site and search engine, according to a survey from Gallup Poll and USA Today.
The business benefits of a cloud computing model have been well stated. You cut costs by switching to more flexible on-demand IT resources that can better handle the ebb and flow technology needs at a company.
Latest News Articles
- The Gameover Trojan program is back, with some modifications
- Google to tour Europe to discuss right-to-be-forgotten ruling
- Infosys revenue and profit rise ahead of CEO change
- Samsung gives its app store a makeover with a focus on Galaxy devices
- Asus G550JK gaming notebook
Most Popular Articles
- 1 What's the difference between an Intel Core i3, i5 and i7?
- 2 Laser vs. inkjet printers: which is better?
- 3 Windows 7 Home Premium vs. Windows 7 Professional
- 4 How to play DVD movies on your Nintendo Wii
- 5 How do I connect my TV to the Internet?
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Best Deals on GoodGearGuide
- Notebooks View all »
- Tablets View all »
- Mobile Phones View all »
- TVs View all »
- Digital Cameras View all »