LG has been making an impression with its flexible displays and now the company is set to roll out new processes and materials to make them cheaper to produce.
We took a close look at how an iPhone 6 gets completely taken apart, coated in gold, then put back together in full working order.
Yes, it seems US and UK spy agencies tried to snoop on people's smartphones, the company says. But privacy and security harm to users is limited by Gemalto's own network security and newer encryption used on modern networks.
New to photography? Learn how to process and edit raw images from your digital SLR for the best results.
New paragraph in the Web giant's terms of service is intended to more clearly explain the manner in which software automatically scans and analyzes the content of emails.
Millions of Blue Cross Blue Shield customers could be affected by the cyberattack against Anthem, the insurance provider confirms.
By making chip designs themselves a little bit programmable, a Silicon Valley startup expects benefits like quicker network upgrades and better search engine performance.
Technically Incorrect: A California woman gets a letter from Time Warner Cable, with her first name changed to the C-word.
At a cybersecurity summit at Stanford University, President Barack Obama signs an order calling for standards and processes for government and companies to share information in the fight against hacks and cybercrimes.
After service providers and rights holders were called on by the Australian Government to develop a code to address copyright infringement, the industry has responded with a three-strikes scheme for pirates.