A young Russian blogger has revealed a total lack of security at a military rocket facility near Moscow.
North Carolina State University researchers say that many Android phones include apps that can be used by hackers to bypass Android's security features.
Computer scientists at Columbia Engineering say they've developed a system that makes multithreaded programs run more stably and efficiently.
The hugely-popular Siri voice-activated personal assistant in the iPhone 4S has a big security flaw - it responds to commands even when the phone is password-locked.
New software could help keep sensitive information safe, by preventing certain data to be accessed outside a particular room.
A Syracuse University professor says he's uncovered a security flaw in Android apps using the WebView platform.
Every time anything newsworthy happens, concerned citizens take to social networks like Facebook and Twitter, spreading text, images and videos.
Why use a regular old jet ski or patrol boat to monitor a habor when you can deploy an awesome looking sawed off robotic jet ski?
Law enforcement officials across the nation are preparing to adopt a new facial-scanning device designed specifically for the iPhone.
Scammers are already exploiting Google+, using a version of the old survey trick by claiming to offer downloadable invites to the service.
There are billions of photographs floating around Facebook that could potentially be tagged with your name.
This time two weeks ago, I was sitting in a rather delightful beach bar on the south coast of Sri Lanka with a bunch of chaps who were very generous with the beers.
No matter how badly you want to see the "banned Lady Gaga" video, do not click the links floating around Twitter.
The Army is planning to launch its very own version of an apps store where soldiers can download military-specific software for mobile devices.
Open source software is actually more secure than its often more expensive alternatives, say researchers at the University of Warwick and UCL Medical School.
Intel, like many other industry heavyweights, believes we are navigating towards a cyber future that will be heavily dominated by Cloud-based computing.
A new worm is spreading through the murky Twitter ether, tempting gullible users with the promise of identifying those pesky Tweet "stalkers."
Facebook is reportedly moving forward with plans to provide third-party developers and external websites with access to the home addresses and cellphone numbers of its members.
In 2008, popular electronic payment service RBS WorldPay admitted to being hacked by a gang of cyber criminals who stole sensitive information to create cloned debit cards.
Facebook says it's repaired a security vulnerability discovered by a pair of doctoral students at Indiana University.