Rogue web plug-ins that inject their own content over the top of legitimate ads are still in widespread use by unscrupulous advertisers, and several major networks are keeping them in business, according to a recent study.
A Linux kernel developer described the problem posed by vampire mice at a LinuxCon North America presentation.
The Kenya Wildlife Service has a powerful new tool in its fight against the poachers who threaten endangered species living in the country's most remote areas: a high-tech network of custom cameras called Instant Wild that can instantly locate illegal activity as well as keep tabs on nearby animals.
Once a car is linked to the Internet, it could, in theory, be accessed by malicious hackers who could control some functions of the vehicle and even track it without the owner's knowledge.
Desktop Linux users have been relatively malware-free, but an RSA researcher has identified the "Hand of Thief" Trojan, which specifically targets Linux.
One system, four thousand players, 2,500 ships destroyed, and an untold number of weapons discharged: EVE Online's Battle of 6VDT was a beast. Here's how developer CCP kept the slaughter from melting its servers.
The latest major version of Android, known as Jelly Bean, is now the most widely used variant of the platform, according to new statistics from Google.
Early tests, online discussions and even some OEMs seem to show a potential bump in the road for Intel's latest-generation processor architecture -- a bump you can see on a temperature graph.
Google is a shameless tease about possible updates to Android, as its eager users lust after Android 4.3; they report spotting a hint.
A 2012 decision not to renew a long-standing exception to the Digital Millenium Copyright Act drew heavy public criticism.
The Electronic Frontier Foundation says that stringent digital rights management technology will be harmful to online freedom.
Articles by Jon Gold