We currently have a maximum of about 60 minutes to prepare for tech disruptions on Earth due to coronal mass ejections from the sun, but an improved forecasting system could lengthen that lead time by hours...
Like smoke signals, puffs of warm air given off by a computer’s processors can reveal information
Despite a wide selection of smartwatches for men, smaller, fashionable versions designed for women have only recently become available—and their choices are limited
Background app updates, cell tower pings and other hidden activity accounts for almost half the battery drain on Android phones. Christopher Intagliata reports
State and local law enforcement agencies across the U.S. are setting up fake cell towers to gather mobile data, but few will admit it
Victims tend to suffer in silence, making it difficult for parents to identify and address the problem
Wireless companies want next-generation gadgets to download at rates of gigabits per second. The question is how to make it happen
The race to make a medical diagnostic device inspired by Star Trek enters the final stage this month, as consumers put competing designs to the test
Building on advances in object recognition, machine translation and neural networks, scientists have developed software that converts pictures into sentences
Tweets can provide real-time flood maps
How four tech companies tried to fight feature bloat—to greater and lesser success
What are satellites? How do we use them? And why are there so many of them hanging out in Earth's orbit? Everyday Einstein answers these and many other questions about satellites.
Citizen scientists help software developers detect flaws that make their programs vulnerable to hackers
Software and hardware companies push new, feature-bloated versions on us every year. Why do we keep buying?
A detailed look at why computers running the U.S. electrical infrastructure are so vulnerable to digital threats
The spy agency’s warrantless surveillance program on U.S. soil has been expanded to search for signs of hacking, according to the latest classified document leaks from former contractor Edward Snowden...
Connections to a robotic arm have been wired into a tetraplegic person's brain and enabled him to use his thoughts to execute tasks requiring smooth motor control
An Estonia-based cybersecurity firm adopts a “blockchain” public ledger system to verify online transfers of sensitive information