Elizabeth is a Live Science associate editor who writes about science and technology. She graduated with a bachelor of arts degree from George Washington University and has also written for Space.com, Everyday Health, Yahoo and Tom's Guide, among others. Elizabeth has traveled throughout the Americas, studying political systems and indigenous cultures and teaching English to students of all ages.
Is a password manager the best way to secure your accounts? Or is it a risky single point of failure? Here are the pros and cons.
If your identity's just been stolen, don't panic -- be proactive. Here are six simple things you need to do right now.
The EMV standard, also called the chip-and-PIN standard, is replacing the magnetic-stripe system used in U.S. credit and debit cards.
Browser taken over by ads and weird toolbars? Here's how to get rid of them in Google Chrome.
Not only is Microsoft ending support for Windows XP in April, it's also ending updates for its own anti-virus software on XP.
A new smartphone and Google Glass app called NameTag photograph strangers, then scans social media sites for a facial-recognition match.
In a privilege escalation attack, hackers exploit flaws in a system to gain unauthorized access.
A zero-day exploit is an attack on a software flaw that occurs before the software's developers have had time to develop a patch for the flaw.
Virtual sandboxing allows technology users to test programs in a controlled environment without sullying the entire network.
Members of the Wall-E Builder's Club on Yahoo have been busy building scaled replicas of everyone's favorite, trash-picking robot, Wall-E.