Narrow your search
Company uses UAVs to scan and map minefields from air.
Defcon demo to show rootkit running on an Android-based smartphone that could give an intruder full access to all the functions of the device.
Software giant's patch process speeds up after researcher releases code on Net that can be used to target the vulnerability and take over PCs.
Company will start telling people where it thinks Flickr photos were taken, but people can correct the photo-sharing site's misconceptions. Call it crowdsourced cartography.
DARPA contracts to mount threat detection and countermeasure systems on MRAPs designed to locate and engage enemy shooters.
U.S., Israel, Russia, China, and France are gearing up for cyberoffensives, according to a new McAfee report.
Apple's iPhone Configuration Utility 2.1, released last week, isn't designed as an end-user troubleshooting tool--it's really meant to help enterprise users create configuration profiles for device deployment.
There have been many reports, especially with MacBook Air and other laptop owners, where the Mac OS X "kernel_task" process takes up a large amount of CPU when checked in Activity Monitor. When this happens, the computer may run slower and also may app
Offender Locator for iPhone tracks registered sex offenders and displays them on a map using your current location via the iPhone GPS.
GoodFood from GoodRec.com is an amazing application that finds restaurants based on your current location.