Ending the NSA's massive phone database is just one recommendation in a report from the White House's surveillance review panel.
The database contains stolen usernames and passwords associated with Facebook, Twitter, Google, Yahoo, and more.
After users' hashed passwords, e-mail addresses, and other information is exposed in a security breach, the cloud-based hosting service neutralizes the attack and works to prevent future incidents.
The country's new SLIX network will allow rapid transmission of data between researchers -- and let students in partner universities enjoy super-fast Internet speeds.
Investigation into attack on JPMorgan Chase may have expanded to seven of the world's top banks, amid a report that hackers altered records.
Project Hemisphere, which was detailed in slides supplied to The New York Times, included access to phone logs dating back 26 years.
The microblogging platform snaps up Madbits, a startup focused on computer vision and dynamic search technology.
A security initiative from Google hopes to identify and put a stop to previously unknown, unpatched bugs that threaten the Web at large.
This free app puts all your receipts in one place and notifies you of price drops, package delivery, and more.
The hackers were looking for information on federal employees who have top-secret clearance, according to The New York Times.