EMC issued a warning today that hackers have stolen information about its RSA SecurID two-factor authentication that could be used by cybercriminals to more easily breach customers' systems,
Whenever the topic of security is mentioned in the context of cloud computing, it is usually discussed as the "big barrier" to adoption. The perceived or actual lack of security in the cloud makes it impossible for businesses to make the leap into th...
A second review of the controversial Terrorist Finance Tracking Program (TFTP) has done little to allay European parliamentarians' fears of poor data security.
A large network of hacked computers called Rustock, which was responsible for a great volume of spam, has shut down, perhaps as a result of another coordinated take down by security researchers.
A new phishing scam that targets bank and PayPal passwords and other consumer data that criminals use to loot private accounts is designed to beat security built in to Firefox and Chrome Web browsers.
Google on Tuesday updated Chrome, patching a flaw in the browser's copy of Flash Player.
With the rising awareness and concern over the stealing of passwords and other sensitive data from unsecured Wi-Fi networks, Twitter is the latest online services company to boost its use of encrypted website connections.
In the last three months of 2010 attackers managed to serve 3 million malicious advertising, or malvertising, impressions every day. That's the headline figure from a report released today from Web security firm Dasient. According to Dasient, that's ...
The malicious code that led Google to remove more than 50 Trojan applications from the Android Marketplace appears to mainly be a "dropper" -- a program designed to load other code to further compromise the affected smartphone, according to a securit...
In its recent annual security report, Cisco predicted VOIP abuse as a potential area for cyber crime growth.
Published figures estimating the size and scope of botnets are often inaccurate and do not reflect the threat these compromised networks pose to security, according to research released this week by ENISA, the European Network and Information Securit...
The new working professional is always connected, and increasingly, the office is Starbucks, an airport, or home. With new flexibility comes new IT security risks for businesses. Basic defenses like antivirus are important, but not enough to keep cor...
Many of us watch the events in the Middle East and North Africa unfold from afar. But for businesses with operations in these global regions of political unrest, protests, rebel uprising and deteriorating security often force difficult and immediate ...
My colleague, Bill Brenner, has a t-shirt he likes to wear that basically says social networking feeds the darker sides of human nature. The shirt is a parody of a Venn Diagram and shows the relationship between sites like Facebook and Twitter to wha...
Intel will use assets acquired from McAfee to provide cloud security services to protect the growing number of mobile devices that face malware and cyberattack threats.
Most Popular Reviews
- 1 Microsoft Surface Pro 3 Windows 8.1 tablet
- 2 Medion Akoya E4110 (MD 8239) desktop PC
- 3 Samsung Galaxy Tab S (10.5) 4G review
- 4 Dell Inspiron 11 3000 Series convertible laptop
- 5 Kogan Agora 4G review
Best Deals on GoodGearGuide
Latest News Articles
- Baidu, Tencent help Chinese shopping malls take on Alibaba
- LG playing waiting game for plasma TV exit
- Soniq 55in Full HD TV (E55S14A)
- Toshiba sensor to sharpen smartphone photos
- Samsung's 3G Gear S could pave the way for the smartphones of the future
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.