DDoS attacks are a way to keep corrupt corporations honest, according to an anonymous member of DerpTrolling, who gives us an inside look at the self-proclaimed gods of the Internet.
A relatively cheap and fun do-it-yourself project to experience the joys of virtual reality without breaking the bank.
Residential refrigerator and freezer energy standards are changing -- here's what you need to know.
Six out of 10 consumers are unaware that the most commonly used light bulbs are about to disappear from store shelves.
The pet communication system not only features live two-way video, it also gives out tasty treats and a variety of scents to entertain your furry companion.
It won't cure all of your Mac's ills, but a quick and easy first step toward bringing a sluggish Mac back to health is using OS X's Disk Utility to repair disk permissions.
Whether the FBI and NSA have the legal authority to obtain the master keys that companies use for Web encryption remains an open question, but it hasn't stopped the U.S. government from trying.
National Security Agency discloses in secret Capitol Hill briefing that thousands of analysts can listen to domestic phone calls. That authorization appears to extend to e-mail and text messages too.
We now know that the NSA uses something called PRISM to monitor private Web data. Sounds like "1984." What does it really mean?
A recently fixed vulnerability at the U.S. General Services Administration highlights the dangers of using your Social Security Number for identification. Federal and state laws restrict use of SSNs by public and private organizations.