The smart home space remains the domain of the early adopter, but Apple's HomeKit market is more scattered than most.
Twitter has ramped up filtering and reporting options on its website and in its mobile apps.
A security researcher finds a gaping hole in automatic network connections made by plugging in a dongle.
The Dyn DDoS attack is like a war in heaven. Mortals beware.
The new router sports 802.11ac and 802.11ad, a built-in Plex server, 10Gbps networking, and bonded gigabit Ethernet.
Every hosted backup solution manages encrypted storage a little differently. We look at who gives subscribers the keys to the castle.
Apple's latest camera innovation turns photos into data streams that can be prodded for many different kinds of enhanced results.
Independent researchers tracked down malware sent to a Middle Eastern human-rights activist and alerted Apple, which patched three separate zero-day exploits.
AT&T Mobile Share Advantage plans will drop overages in favor of throttling, following T-Mobile and Sprint in this consumer-friendly trend. We dig into the details here.
The company had lagged behind competitors in providing financial incentives to report exploits to it.
Microsoft's move of Skype to the cloud comes with a continuing lack of disclosure on security and privacy.
Yes, even bad-guy malware developers have to keep their "customers" happy. Read what happens when F-Secure tests the "help desks" of four crypto-locking malware makers.
Pokémon Masters, beware: The iPhone app gains access to your Google account, but you can revoke the access now, and a better fix is coming.
Two-factor authentication and other verification systems are for naught if someone can call your phone carrier and get your number transferred to them.
Another spate of failed and much-delayed high-profile crowdfunded projects should give pause to potential funders, especially of giant hardware projects.
Articles by Glenn FleishmanNext Page