When virtual assistants almost pass as human, they only seem more robotic.
Last week, I wrote about some of the reasons airlines can get away with bad customer service. One extreme example…
The cutesy feature could pressure employees into sharing their every move—both on and off the clock.
As much as other types of companies might want to ignore their lowest-margin patrons, most don’t have that luxury.
At the current rate, customs agents are on track to increase inspections of travelers’ electronic devices by a third this year.
Can “polluting” browsing history with fake traffic make it harder for ISPs to spy on you?
An analysis of the top 100,000 Android apps found tens of thousands of pairings that leak sensitive data.
A dispute over a garage-door opener shows just how much control manufacturers have over your internet-connected things.
Some of the best digital-forensics labs don't belong to the police—they're run by banks, tech companies, and retailers.
Data patterns alone can be enough to give away what video you’re watching on YouTube.
If so, he’s extremely vulnerable to being hacked.
As hackers learn to imitate the body's unique features, scientists might turn to brainwaves and genomics to verify people's identities.
New restrictions on flights from the Middle East reflect how just about anything with power can be turned into an explosive.
DHS has banned carry-on devices larger than a smartphone on flights from 10 airports across the Middle East.
A government-led effort paves the way for data extracted from electronic devices to be accepted as evidence in court.
The Justice Department has indicted four Russians for their roles in a cyberattack on Yahoo that compromised half a billion user accounts.
A computer model is in the works to simulate how New Yorkers would respond in the the first 30 days after a nuclear attack.
Thermal images reveal what parts of the screen were tapped, even after it’s left untouched for 30 seconds.
With its latest leak, the site is daring reporters to go on a scavenger hunt for scoops.
Unlike a conventional military strike, state-on-state cyberattacks can go unreported for years.