Are biometrics a valid way to perform authentication? One response is that the use of biometric information for security is dubious at best because once your biometric data has been compromised you can't change it, ever!
Apple’s Touch ID fingerprint reader can already be fooled (video)
The Chaos Computer Club (CCC), a group of European hackers who have a history of demonstrating the weaknesses in various computer systems since the 1980's, has successfully tricked the fingerprint reader on the iPhone 5S using a photograph of a fingerprint taken off glass!
Moto X Style vs OnePlus 2: which is the true flagship killer?
What features is the OnePlus 2 missing?
Moto X Style vs Play: what’s the difference?
How to get Location address in an Android app
OnePlus 2 vs the competition: by the numbers
OnePlus 2 StyleSwap cover hands-on comparison, availability and more
OnePlus 2 hands-on and first impressions
OnePlus 2 vs OnePlus One – the battle of the “flagship killers...
Moto X (2015) Preview: What to expect
5 things we want to see from the OnePlus Two!
OnePlus 2 rumor roundup (updated 7/24)
The Watch just made Apple over $1 billion. Why hasn’t Android Wear been...