The Polar team will be joining the Google+ team
The Swedish Post and Telecom Authority made an 180 degree turn, and started enforcing the data retention law again
One in three applications request excessive permissions, and privacy information is inadequate in 85 percent of them, a study found
Yahoo's disclosure comes amid newly unsealed court documents
The technologies behind Apple Pay, from encryption to one-time tokens to Touch ID, all help remove vulnerabilities in the current point-of-sale process.
Keep your photos and other Google account data safe with this essential security feature.
The leaked screenshots show a Windows-7-like Start menu next to a mini-bar of Windows 8.1 Tiles, an awkward compromise that might not satisfy anyone.
Up your game by finding a better mouse. Our in-depth guide shows you what to look for and how to analyze your needs.
There's nothing fancy about this peripheral, but it's a truly reliable workhorse.
MEMS-IGZO screens could halve power use in smartphones
The exposure technology improves infrared footage
Mark Marmilev of Brooklyn maintained the technical infrastructure for Liberty Reserve's operations
Two local TV stations will consolidate onto a single channel, freeing up space for new wireless broadband services