An automated thermal detection system that can discern wild elephants from background and other animals in infrared images could save lives in parts of the world where the animals roam free and often enter villages and other ...
Going online without understanding the basics of how the internet works is like getting behind the wheel without knowing the road rules: you might still get where you're going, but you could be a danger to yourself and those ...
A Dutch company that makes SIM cards for cellular phones says it is investigating reports that it was hacked by Britain's electronic spying agency in cooperation with the U.S. National Security Agency.
Did the National Security Agency plant spyware deep in the hard drives of thousands of computers used by foreign governments, banks and other surveillance targets around the world?
Smart technology is in our homes, cars and phones. And soon, it will power our luggage, thanks in part to University at Buffalo engineering student Martin Diz.
In the digital age in which we live, monitoring, security breaches and hacks of sensitive data are all too common. It has been argued that privacy has no place in this big data environment and anything we put online can, ...
Apple is betting that people want to pay with a tap of the phone rather than a swipe of the card.
Malicious software is increasingly making its way into mobile phones through "cloned" versions of popular apps, and software weaknesses in legitimate ones, security researchers said Tuesday.
Two U.S. Supreme Court cases about police searches of mobile phones without warrants present vastly different views of the ubiquitous device.
Arab bloggers on Monday discussed ways to boost cyberactivism at a meeting in the Jordanian capital, faced with new challenges three years after the start of Internet-fuelled revolts in their region.