The rate at which you type and the length and pattern of your pauses may be the latest in biometric identification. Sumi Das talks to researchers at Iowa State University about how their research could render passwords obsolete.
Before you sync your iCloud or reinstall your apps, you need to lock down your iPhone or iPad. Here are seven important tweaks (and more) you can set to bolster your privacy.
So-called Internet safety software ComputerCop, often given to families for free by their local police departments, puts children and personal data at risk, a new report alleges.
If you're happy and you know it, your keystrokes will surely show it, say researchers who've developed a program that can recognize users' emotions with a high level of accuracy.
Creating art with that splendidly elaborate gadget known as the typewriter is nothing new. Just ask Hemingway or Orwell. But this beautifully hacked 1937 Underwood Standard takes things to an entirely different realm.
When Raytheon decided to build a new missile factory, it brought in new technologies and replaced a manual-intensive process that was prone to mistakes.
That's the claim made by Trevor Eckhart, a man who posted a video showing Carrier IQ's software being used to document just about everything users do on their devices.
Law enforcement agencies seize more than 1,000 computers, smartphones, and hard drives in a massive operation that goes after malware said to have "sophisticated" capabilities and "breathtaking" invasiveness.
A malicious monitoring app could log the keystrokes and touch input on your iOS device, say security researchers.
The US government designed computerized hacking tools to automate the process of compromising computers with attacks that let it harvest data before it is encrypted, new documents show.