Shake it up. A low-tech kitchen gadget on Kickstarter simplifies the process of creating an in-shell golden egg.
After users' hashed passwords, e-mail addresses, and other information is exposed in a security breach, the cloud-based hosting service neutralizes the attack and works to prevent future incidents.
In an interview with CNET, the mobile-chip maker's president, Derek Aberle, discusses his company's strategy to grow in 2015, as well as its China troubles.
For the first time, a distant, pulsing neutron star was there for astronomers to study -- until it disappeared. Crave's Eric Mack explains the extreme forces hiding it from view.
Two updates were beset by technical issues, forcing Microsoft to issue another update to remove the faulty software.
Bid on a piece of WWII spy history with an unprecedented collection of cipher machines and accessories up for sale at Christie's auction house through Dec. 3.
Some consumers accused Apple of unfairly boosting iPod prices because it banned music from services other than the iTunes store. They're asking for $350 million, and even Steve Jobs will make an appearance in court, via taped deposition.
Secure network connections protect people against snooping and criminals, but it's a hassle for websites. Mozilla, Cisco, the Electronic Frontier Foundation and others want to change that.
It's handy to cache maps when you know you'll be headed into an area with bad network coverage. Google has tweaked its new Google Maps for Android app to make the feature easier to use.
To stop terrorists and other criminals, cell phones should have encryption backdoors to enable US government surveillance, argues FBI Director James Comey.