I stepped over from the dark side to see which premium streaming services are worth the monthly cost.
We measured the charge percentage of seven popular phones at various times and factored in battery capacity to declare a winner.
It's hard to determine exactly why expensive, powerful Android consoles exist, or to whom they're supposed to appeal.
HTC's executive director of marketing talks about the Vive's secret weapon against the Oculus Rift and the future of virtual reality.
Asus chairman Jonney Shih is confident that the Zenfone 2 will do for phones what the Eee PC did for laptops, even without carriers to sell it.
Using PlayLater, you can take advantage of cheap software and free trials to get months' worth of video content. But how legal is it?
Exaggerated media reports about data breaches may scare people away from thinking they can improve their own personal security habits.
It will be an amazing year, with OLED, curved and bending screens, nanocrystal color, 4K/Ultra HD sets, smarter TVs, and even glasses-free 3D.
We compare the battery life on the iPhone 6 and iPhone 6 Plus to the Samsung Galaxy S5, the LG G3, the HTC One M8 and the OnePlus One.
From an encryption case for your iPhone to impressive new noise-cancelling technology, here's the best of what we saw at CTIA's Super Mobility Week 2014.
Teaser: From giant curved TVs for your living room to curved smartwatches for your wrist, Europe's biggest tech show was packed with innovation.
Will a mainstream smartphone ever be unbreakable? Thanks to new materials and innovative manufacturers, we're closer than ever before.
Java may be among the most insecure pieces of software on any computer, and most of us have little reason to run it.
Does OS X Mavericks address Apple's half-hearted approach to desktop security? Or does it not go far enough?
Your smartphone is probably a much more tempting target for cybercriminals than your desktop computer.
The "black budget" leaked by Edward Snowden mentions the NSA's focus on researching "groundbreaking cryptanalytic capabilities." What does that mean?
Between the National Security Agency (NSA) and Google's own overreaching terms of service, your files on Google Drive may be open to snooping from both organizations. What are the risks and how can you minimize them?