Ask a question
1 week ago
I am familiar with and use the Tor browser when on my Windows laptop to try to maintain some semblance of online privacy. Is Tor sufficient to ensure...
1 week ago
Avast released a report saying that they were able to recover data, including rather compromising personal photos, from used Android devices that had been “...
3 weeks ago
Facebook was helping psychology researchers determine whether being exposed to disproportionately positive or negative posts in peoples’ newsfeed caused...
4 weeks ago
Not that I have anything in particular to hide, but since the Snowden revelations about how widespread government surveillance and overreach has become, I...
5 weeks ago
It seems like the struggle to protect a modicum of online privacy is a never ending battle. Facebook announced it plans to gather user browsing history for...
9 weeks ago
Can I still be tracked by websites if I block and delete cookies? Are there other things that allow me to be tracked?
11 weeks ago
Yahoo announced today that it will no longer honor “do not track” requests by users and will ignore the browser setting. I am pretty annoyed by this. I don’...
Attackers are exploiting a vulnerability in distributed search engine software Elasticsearch to install DDoS malware on Amazon and possibly other cloud servers.
Samsung Electronics said Monday that it would postpone the release of its first smartphone running the Tizen OS, the Samsung Z, which was set to launch first in Russia.
Social networking sites in China that are modeled on Facebook are having a hard time holding on to users, with customers like Beijing resident Shi Yunfeng, drifting away to newer services.
Vulnerabilities in the Tails operating system could reveal your IP address, but you can avoid trouble by taking a couple of precautions.
The organizers of the FirstNet LTE public safety network have the frequencies and standards they need to build the system, and they know where the money's coming from. They know how to get there from here, but it won't be a quick trip.
Oracle is the latest in a string of firms getting a custom fit instead of off the shelf.
IT leaders need to learn how to manage the evolving legal, privacy and compliance issues of SMAC contracts.
Financial institutions use many technologies to fight crime, but much of the work comes too late, focusing on suspicious activity, like uncharacteristic charges or money transfers, after it happens.
Nearly 90 percent of IT executives expect tech spending to either increase or hold steady. And only 12 percent report budget decreases.
Look to Vista for how Redmond will treat Windows 8 as it moves on to the next bright, shiny OS.