Cryptocat Wins Apple Approval
NSA surveillance and other worldwide events drive interest in secure messaging, and iOS users now have a new option.
Apple SSL Vulnerability: 6 Facts
SSL vulnerability that's been patched in iOS -- but not yet for OS X -- lets attackers intercept email and FaceTime communications, plus push malicious software updates.
Where Are All The Chromebooks?
Despite brisk Chromebook sales, online usage of Chrome OS hardware on the Internet still barely registers with those measuring Web traffic.
Google's Project Tango Sees All
Using an experimental Android prototype, Google wants developers to write apps that do something interesting with real-time awareness of users' surroundings.
Kill Switches: Phones Just The Start
Mandatory phone kill switches will hasten the arrival of the Surveillance of Everything. Consider these 11 technologies that come with strings attached.
LinkedIn Privacy: 5 Safety Tips
Protect your LinkedIn account by browsing securely, keeping your activity private, and recognizing signs of malicious behavior.
802.11ac WiFi Decision Time
Gigabit WiFi has arrived, but its real-world performance may not meet lofty expectations. Find out why, and how and when to think about upgrading.
Flappy Bird Killed By Creator
Developer who says success "ruins my simple life" yanks hugely popular mobile app that reportedly earned him $50K a day.
NAC Comes Back
BYOD and advanced malware threats help network access control morph from tired technology to mainstream must-have.
The Problem With Two-Factor Authentication
The failure of corporate security strategies to protect personal identity information from hackers resides more with system architecture than with authentication technology. Here's why.
20 Security Startups To Watch
Cloud security, mobile security, advanced behavioral detection, and a few other surprises make this latest crop of newcomers worth watching.