Android and iOS devices have safe working lifespans of different lengths. Here's what you need to know.
We sent our writer, an amateur photographer, out with a professional photographer to take pictures of the same subjects. Here are their photos and the lessons we learned.
The CIA has been trying to hack iPhones, the latest Snowden documents reveal, but by all appearances, the agency has largely failed.
Scrubbed credit-card purchase data can easily be used to track individuals, and Big Data may never truly be anonymous, a new study finds.
The Shellshock flaw affects a very important software program that most people know little about. Here's how Shellshock could affect you.
Upscale hotels let guests control room lights and other functions with a tablet. But these systems can be hacked, with interesting results.
Many people 'jailbreak' iPhones without realizing the security risks. Here's what jailbreakers need to know, and do, to keep devices safe.
Government officials worry about devastating cyberattacks on the U.S. Here are 10 things that could be hit -- and how likely each attack is.
Two Greek researchers think they've found a way to knock an entire cellular network offline by flooding it with bogus requests.