Tips on where to start in managing risk

Plugging the holesImage by Les ChatfieldWhat is risk management? Any time you have something of value…

As with PCs, you can now customize Raspberry Pi-like computers

The Raspberry Pi 3 is a great product, but it can't be customized. People may desire…

Encrypted email service ProtonMail is now accessible over Tor

The creators of encrypted email service ProtonMail have set up a server that's only accessible over…

Google reveals its stealthy moves to keep Android phones free from malware

Way back when Android 4.2 Jelly Bean was released, Google added a feature called Verify Apps…

The XPS 27, an all-in-one for the sound-and-vision crowd video – CNET

With 10 speakers and a great 27-inch display, your home-entertainment system may get jealous of this…

Android Ransomware Locks Phone and Asks for Credit Card Number

A new ransomware family is targeting Android devices, locking access to the screen, and constantly pestering…

IDG Contributor Network: Ransomware takes a nasty turn

Another open source database has been targeted for attack. Only this time, paying the ransom isn't…

How Android One could complete Google’s grand Android plan

Ahah. It's all starting to make sense. Google, if you haven't heard, is said to be…