Is a password manager the best way to secure your accounts? Or is it a risky single point of failure? Here are the pros and cons.
If your identity's just been stolen, don't panic -- be proactive. Here are six simple things you need to do right now.
The EMV standard, also called the chip-and-PIN standard, is replacing the magnetic-stripe system used in U.S. credit and debit cards.
Not only is Microsoft ending support for Windows XP in April, it's also ending updates for its own anti-virus software on XP.
A new smartphone and Google Glass app called NameTag photograph strangers, then scans social media sites for a facial-recognition match.
A zero-day exploit is an attack on a software flaw that occurs before the software's developers have had time to develop a patch for the flaw.
Virtual sandboxing allows technology users to test programs in a controlled environment without sullying the entire network.
Members of the Wall-E Builder's Club on Yahoo have been busy building scaled replicas of everyone's favorite, trash-picking robot, Wall-E.
New studies find that violent video games do more than just promote aggressive behavior; they also help teach quick decision-making.