EMC's RSA Security division says the security of the company's two-factor SecurID tokens could be at risk following a sophisticated cyber-attack on the company.
EMC issued a warning today that hackers have stolen information about its RSA SecurID two-factor authentication that could be used by cybercriminals to more easily breach customers' systems,
Whenever the topic of security is mentioned in the context of cloud computing, it is usually discussed as the "big barrier" to adoption. The perceived or actual lack of security in the cloud makes it impossible for businesses to make the leap into th...
A second review of the controversial Terrorist Finance Tracking Program (TFTP) has done little to allay European parliamentarians' fears of poor data security.
A large network of hacked computers called Rustock, which was responsible for a great volume of spam, has shut down, perhaps as a result of another coordinated take down by security researchers.
A new phishing scam that targets bank and PayPal passwords and other consumer data that criminals use to loot private accounts is designed to beat security built in to Firefox and Chrome Web browsers.
Google on Tuesday updated Chrome, patching a flaw in the browser's copy of Flash Player.
With the rising awareness and concern over the stealing of passwords and other sensitive data from unsecured Wi-Fi networks, Twitter is the latest online services company to boost its use of encrypted website connections.
In the last three months of 2010 attackers managed to serve 3 million malicious advertising, or malvertising, impressions every day. That's the headline figure from a report released today from Web security firm Dasient. According to Dasient, that's ...
The malicious code that led Google to remove more than 50 Trojan applications from the Android Marketplace appears to mainly be a "dropper" -- a program designed to load other code to further compromise the affected smartphone, according to a securit...
In its recent annual security report, Cisco predicted VOIP abuse as a potential area for cyber crime growth.
Published figures estimating the size and scope of botnets are often inaccurate and do not reflect the threat these compromised networks pose to security, according to research released this week by ENISA, the European Network and Information Securit...
The new working professional is always connected, and increasingly, the office is Starbucks, an airport, or home. With new flexibility comes new IT security risks for businesses. Basic defenses like antivirus are important, but not enough to keep cor...
Many of us watch the events in the Middle East and North Africa unfold from afar. But for businesses with operations in these global regions of political unrest, protests, rebel uprising and deteriorating security often force difficult and immediate ...
My colleague, Bill Brenner, has a t-shirt he likes to wear that basically says social networking feeds the darker sides of human nature. The shirt is a parody of a Venn Diagram and shows the relationship between sites like Facebook and Twitter to wha...
Most Popular Reviews
- 1 Motorola Moto G (2nd Gen.) android smartphone
- 2 HTC One Mini 2 android smartphone
- 3 Microsoft Surface Pro 3 Windows 8.1 tablet
- 4 Medion Akoya E4110 (MD 8239) desktop PC
- 5 Samsung Galaxy Tab S (10.5) 4G review
Best Deals on GoodGearGuide
Latest News Articles
- Motorola Moto X and 360: On sale in Australia, October
- Lenovo to cough up $100 refunds, $250 vouchers to settle IdeaPad suit
- Ericsson acquires majority stake in Apcera for cloud policy compliance
- Delve, Office Graph must transcend Office 365 to be revolutionary
- EMC reportedly held merger talks with Hewlett-Packard
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.