10531 Results for

secure

Article

Samsung Pay vs. Apple Pay: There's a difference

They sound alike, but the two mobile payment solutions each offer their own unique advantages.

By March 5, 2015

Article

'FREAK' security flaw left Apple, Android users exposed

Apple and Google working on fixes for the decade-old flaw, which researchers blamed on an abandoned US policy on encryption.

By March 3, 2015

Article

These are the 21 things you need to know from MWC 2015

From the doubly-curved Samsung Galaxy S6 Edge and news of Google's wireless service, to a suitcase that weighs itself, here are the most important things that happened at the world's largest mobile show.

By March 5, 2015

Article

Microsoft Windows vulnerable to 'FREAK' encryption flaw too

Previously thought limited to Apple and Google browsers, the flaw leaves communications between affected users and websites open to interception.

By March 5, 2015

Article

Net neutrality a reality: FCC votes to bring Internet under utility-style rules

In a 3-2 vote, the agency decides to apply the same rules that govern telephone service to broadband, with the hope that it ensures the fair and equal treatment of all traffic on the Internet.

By February 26, 2015

Article

Zombie-proof log cabin has 10-year anti-zombie guarantee

If the zombie apocalypse ever arrives, you'll be happy you dropped a ton of cash for a cabin designed to fortify you against attacks by the undead.

By October 20, 2014

Article

Samsung answers Apple with curvy Galaxy S6 phones, Samsung Pay

Korean electronics giant fires the latest shots at rival Apple with newly designed flagship smartphones, a mobile payment system, and a virtual reality headset.

By March 1, 2015

Article

Meet Runcible, a smartphone that looks like a pocket watch

At least one company says smartphones don't have to be rectangular slabs.

By February 26, 2015

Article

Scan your iris to unlock your phone in Fujitsu's eye-opening concept (hands on)

Forget fingerprints, Fujitsu's concept phone scans your eyes with infrared to grant access to your data.

By March 3, 2015

Article

Lenovo's Superfish screwup highlights biggest problem in software

By not properly vetting the Superfish adware, Lenovo became the most recent unwitting example of broken links in the software supply chain.

By February 27, 2015