The more flattering the photo, the more likely you are to print more, which helps sell more paper and ink.
We search four computers with Identity Finder and find more personal information than is comfortable.
Although some large shops are delaying Windows 7 implementation, observers caution not to wait too long.
Lack of U.S. privacy regulations could stymie scientific research, warns Carnegie Mellon professor and machine learning researcher.
With bargain ink as a selling point, does Kodak's ESP-7 live up to its image as a cheap and cheerful printer?
Here's the scenario: Attackers compromise a major brand's Web site. But instead of stealing customer records, the attacker installs malware that infects the computers of thousands of visitors to the site.
The problem of Twitter etiquette only gotten worse as the popularity of its service has climbed. Here's how you can keep your manners in check.
Cybersquatters redirect users to a phishing site, a Web page with objectionable content or -- most commonly -- advertising that may link to competing products and services.
Analysis: Foreign firms are concerned that data maintained on U.S. soil will be subject to surreptitious peeks by certain U.S. government agencies.
The RIAA's lawsuits are ineffectual and have become a PR disaster for the music industry.
Analysis: Wolfgang Puck wants his .food network, Al Gore wants .eco -- and everyone else wants a vanity top-level domain.
Domain-name poaching can be costly for businesses in terms of lost revenue and damage to a brand's reputation. Trademark owners say cybersquatting is spinning...