A large network of hacked computers called Rustock, which was responsible for a great volume of spam, has shut down, perhaps as a result of another coordinated take down by security researchers.
A new phishing scam that targets bank and PayPal passwords and other consumer data that criminals use to loot private accounts is designed to beat security built in to Firefox and Chrome Web browsers.
Google on Tuesday updated Chrome, patching a flaw in the browser's copy of Flash Player.
With the rising awareness and concern over the stealing of passwords and other sensitive data from unsecured Wi-Fi networks, Twitter is the latest online services company to boost its use of encrypted website connections.
In the last three months of 2010 attackers managed to serve 3 million malicious advertising, or malvertising, impressions every day. That's the headline figure from a report released today from Web security firm Dasient. According to Dasient, that's ...
The malicious code that led Google to remove more than 50 Trojan applications from the Android Marketplace appears to mainly be a "dropper" -- a program designed to load other code to further compromise the affected smartphone, according to a securit...
In its recent annual security report, Cisco predicted VOIP abuse as a potential area for cyber crime growth.
Published figures estimating the size and scope of botnets are often inaccurate and do not reflect the threat these compromised networks pose to security, according to research released this week by ENISA, the European Network and Information Securit...
The new working professional is always connected, and increasingly, the office is Starbucks, an airport, or home. With new flexibility comes new IT security risks for businesses. Basic defenses like antivirus are important, but not enough to keep cor...
Many of us watch the events in the Middle East and North Africa unfold from afar. But for businesses with operations in these global regions of political unrest, protests, rebel uprising and deteriorating security often force difficult and immediate ...
My colleague, Bill Brenner, has a t-shirt he likes to wear that basically says social networking feeds the darker sides of human nature. The shirt is a parody of a Venn Diagram and shows the relationship between sites like Facebook and Twitter to wha...
Intel will use assets acquired from McAfee to provide cloud security services to protect the growing number of mobile devices that face malware and cyberattack threats.
A company that builds tools to give greater privacy online released a free browser extension on Tuesday that lets users selectively decide which websites they will allow to track them.
USANomad asked the Answer Line forum if people can eavesdrop on Voice Over Internet Protocol (VOID) phone calls.
The group of online activists known as "Anonymous" has released a batch of e-mail concerning Bank of America that was given to the group by a whistleblower who worked for a related mortgage and vehicle loan insurer.
Most Popular Reviews
- 1 Apple iPhone 6 Plus: An in depth review
- 2 HTC One Mini 2 android smartphone
- 3 Oppo Find 7 Android smartphone
- 4 Medion Akoya MD99410 (E1232T) touchscreen laptop
- 5 HTC Desire 610 smartphone
Best Deals on GoodGearGuide
Latest News Articles
- Intel pushes factory IoT with $9 million cost savings at plant
- Malware program targets Hong Kong protesters using Apple devices
- Google triples bug bounty reward range to $15,000
- Ellison pushes Oracle's new Cloud platform hard, but questions linger
- Shellshock flaw could pose risks to payments industry
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.