Some iPod users are swapping jacks with strangers and finding new musical tastes. Should Apple add wireless broadcast and Rendezvous to the iPod so we can all tune in?
An attacker can gain control of another user's machine using an HTML-formatted e-mail with an attachment that contains a small remote-control program. The e-mail can be sent directly to the victim, or can be placed on a website.
A hacker who discovered a potentially devastating security hole in Microsoft's Internet Explorer says he has found himself in the undesired position of providing technical support to people who cannot install the patch that Microsoft released to fix t...
The future of a key Web standard that would give consumers control over their online privacy hangs in the balance after news emerged that an entrepreneur will likely be awarded a set of patents on the technology.