The most important things to know when shopping for a cell phone.
That's just plain wrong, because putting any small speaker down there forfeits a major share of its sound quality.
The rules will require tech companies to hand over source code, submit to audits and build deliberate back doors into both hardware and software products.
Yes, it seems US and UK spy agencies tried to snoop on people's smartphones, the company says. But privacy and security harm to users is limited by Gemalto's own network security and newer encryption used on modern networks.
Customers will have their finances at their fingertips if they have an Apple device.
We have seen the future and it includes an iris-scanning smartphone and luggage that can weigh itself. Check out the rest of the impressive tech from day two of Mobile World Congress 2015.
Invitations are here! Microsoft's press conference at Mobile World Congress in March signals the company's first event as a phone maker since taking the reins from Nokia.
AT&T and Verizon are big winners in the record-breaking wireless auction, but it's Dish Network that walks away with an unexpectedly large swath of spectrum. What will it do with it?
Apple says users of its OS X operating system are "safe by default" from the new security vulnerability, which has been described as bigger than Heartbleed.
Before it's even on the market, the watch wins gold in the 2015 iF Design Awards. The next challenge will be to see if it can win the battle for consumers' hearts and dollars.