The Dyn DDoS attack is like a war in heaven. Mortals beware.
The new router sports 802.11ac and 802.11ad, a built-in Plex server, 10Gbps networking, and bonded gigabit Ethernet.
Every hosted backup solution manages encrypted storage a little differently. We look at who gives subscribers the keys to the castle.
Apple's latest camera innovation turns photos into data streams that can be prodded for many different kinds of enhanced results.
Independent researchers tracked down malware sent to a Middle Eastern human-rights activist and alerted Apple, which patched three separate zero-day exploits.
AT&T Mobile Share Advantage plans will drop overages in favor of throttling, following T-Mobile and Sprint in this consumer-friendly trend. We dig into the details here.
The company had lagged behind competitors in providing financial incentives to report exploits to it.
Microsoft's move of Skype to the cloud comes with a continuing lack of disclosure on security and privacy.
Yes, even bad-guy malware developers have to keep their "customers" happy. Read what happens when F-Secure tests the "help desks" of four crypto-locking malware makers.
Pokémon Masters, beware: The iPhone app gains access to your Google account, but you can revoke the access now, and a better fix is coming.
Two-factor authentication and other verification systems are for naught if someone can call your phone carrier and get your number transferred to them.
Another spate of failed and much-delayed high-profile crowdfunded projects should give pause to potential funders, especially of giant hardware projects.
Security researchers discovered a number of weaknesses in iMessage's encryption system. Apple's patches are already slated to appear.
Amazon says few users turned on full-device encryption, but that's the wrong approach to helping users protect their data. Thankfully, the company changed its mind.
You can't keep "bad guys" from using a key handed over to "good guys."
Articles by Glenn FleishmanNext Page