Google is investigating a growing number of reports that hackers are breaking into legitimate Gmail accounts and then using them to send spam messages.
Microsoft today patched 25 vulnerabilities in Windows, Exchange and Office, including nine marked "critical," the company's highest threat ranking.
After testing endpoint and perimeter data loss prevention products, we conclude our series with a look at data loss prevention tools that can do both.
In the wake of high profile cyber-bullying cases -- such as the one that led to a teenage suicide in 2006 -- social networking sites have been tightening the belt on Internet security.
A week after Web hosting company Network Solutions dealt with a large-scale infection of WordPress-driven blogs, the company acknowledged that other sites it hosts have been compromised.
The information stolen from Google in cyberattacks late last year included a password system that gives users access to multiple services after just one login, according to a news report.
Tyler Shields, senior member of the Veracode Research Lab, spends a lot of time <a href="http://www.csoonline.com/podcast/533263">picking apart those BlackBerry devices</a> that are ubiquitous across the enterprise. What he's found may disappoint tho...
These "White Hat" security researchers are ethical hackers whose discoveries and inventions shake things up — as they try to stay one step ahead of their underground "Black Hat" cousins…
A researcher is working on technology he hopes will be able to control RFID tags and protect private information.
A few weeks ago, officials at Fairfax County Public Schools thought they had a hacker on their hands.
Have hackers, bonets or rogue ex-employees managed to steal mission-critical data from the enterprise? Don't ask the CIO.
A computer security researcher has released a plugin for Firefox that provides a wealth of data on Web sites that may have been compromised with malicious code.
One week after a critical bug was made public, Oracle has patched its Java virtual machine to fix an exploit that could be used to sneak malicious software onto a computer.
The Zeus botnet is now using an unpatched flaw in Adobe's PDF document format to infect users with malicious code, security researchers said today.
While some large enterprises have moved their information-technology infrastructure to a third-party managed service to save costs, small firms--especially startups--have come to rely on cloud services to cut initial outlays and help them focus on th...
Latest News Articles
- Google launches white Nexus 7, but not for Australia
- Lawmakers hear mixed message on limiting spectrum bidding
- Microsoft Patch Tuesday reinforces the value of software upgrades
- Update vulnerability in third-party SDK exposes some Android apps to attacks
- Twitter, the protector of news?
Most Popular Articles
- 1 What's the difference between an Intel Core i3, i5 and i7?
- 2 Laser vs. inkjet printers: which is better?
- 3 How do I connect my TV to the Internet?
- 4 Windows 7 Home Premium vs. Windows 7 Professional
- 5 Samsung’s 2013 Smart TVs: everything you need to know
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Best Deals on GoodGearGuide
Best Deals on PCWorld
- Networking, Wireless & VoIPView all »
- NotebooksView all »
- TabletsView all »
- Mobile PhonesView all »
- Printers & ScannersView all »