Apple logo from inside Apple Store in Boston

super bowl android

6 Techiest Commercials from Super Bowl 50

In between the booze (Budweiser), cars (Buick, Audi, etc.) and food (Doritos, Coke, etc.) commercials during the Super Bowl 50 broadcast will be a fair representation by tech companies large and relatively unknown.  MORE: 12...

110040002 1

Modular cellphone kit can be used for IoT and wearables

You can assemble a rudimentary 2G cell-phone at home with the RePhone Kit Create, which can also be used to make wearables and IoT devices.

google wallet transfer money

Get ready for iGen, the Millennials' replacement

Their self-esteem derives from social networks, and they don't trust traditional banking forms, says a new report on the latest generation about to join your workplace.

quick facts lte u

LTE-U’s cold war may be thawing, as field testing commences ahead of summit

The FCC last week granted Verizon and Qualcomm permission to conduct limited tests of LTE-U technology in Raleigh, North Carolina and Oklahoma City, ahead of a planned summit meeting next week.

human head interface computers gears thoughts clouds tablets mobile brain

DARPA researchers to push the limits of reading and writing human brain neurons

This week neuroscientists met with DARPA in Arlington, Virginia, to embark on a project breaking Stevenson’s Law.

Pepper the robot at CES

Now that AI has mastered 'Go,' are all our jobs next?

One by one, artificial intelligence has overcome the obstacles set before it. Is this all part of an inevitable trend leading to humanity's obsolescence -- or, at least, unemployment?

bug malware infected virus

Want to secure a Windows PC? Turn off Administrator rights

Windows malware can be prevented by turning off a user's administrator rights.


Make a $40 Linux or Android PC with new Raspberry Pi 2 rival

If you want to build a powerful $40 Linux or Android PC with 4K video support, consider Hardkernel's Odroid-C2 computer.


Internet Archive's malware museum takes you back to the days of cheeky viruses

The Internet Archive is creating a repository of the darker aspects of computer culture: malware.

ios7 iphone touchid hero 100055380 gallery 100349723 large

Apple confirms iPhone-killing “Error 53,” says it’s about security

The iPhone’s mysterious "Error 53" bug is tied to Touch ID tampering, at least according to Apple.

thomas davis reuters

3D printing to make NFL debut at Super Bowl 50

Carolina Panthers linebacker Thomas Davis is using a 3D-printed sleeve to protect his surgically repaired broken arm so he can play in Super Bowl 50 against the Denver Broncos.

free security avast

Researcher finds serious flaw in Chromium-based Avast SafeZone browser

A Google security researcher found a serious vulnerability in the Avast SafeZone browser that doesn't exist in Chromium, the open-source browser that serves as its foundation.

space rocket launch

CoreOS launches Rkt- the container that’s not Docker

CoreOS – a 2013 San Francisco startup backed by Google Ventures and $20 million in funding – is offering an alternative to the wildly popular Docker container runtime, which they say is more security-focused.

job opportunity2 millennial

How the economy affects career confidence in the world’s millennials

Young people in emerging economies possess a brighter outlook toward their technology prowess and job opportunities than those in developed countries, according to a report by IT outsourcing provider Infosys.

Ed Yourdon, 2008

Edward Yourdon remembered for 'great wisdom about everything IT'

If you're interested in emerging IT problems and trends, there’s a good chance you've read something by Edward Bourdon, who passed away recently at 71.


Man turns tables on scammers

Like countless others, Seth had gotten scammers' phone calls from people who said they wanted to fix his computer. The last time they called, he was ready to turn the tables.

malware payment terminal credit card

Dridex banking malware mysteriously hijacked to distribute antivirus program

An unknown person -- possibly a white hat hacker -- gained access to some of the servers that cybercriminals use to distribute the Dridex online banking Trojan and replaced the malware with an installer for Avira Free Antivirus.


The Neutrino exploit kit has a new way to detect security researchers

The developers of the Neutrino exploit kit have added a new feature intended to thwart security researchers from studying their attacks.

Load More