The Email Privacy Act forces the government to seek warrants before asking tech companies for emails. Should this be the same for an individual’s personal emails?
Some people have no interest in running mobile apps on their desktop while others welcome it. Here’s a look at why some want to run mobile apps on their PCs.
Google seems to know everything, including where your home is located. This info is based on your router, but how does Google know where your WiFi router is anyway and can you stop this?
A new bill has entered the U.S. Congress for a new law requiring the presentation of identification before purchasing prepaid cards. Do you think this is a good thing?
A startup called Privacy has created a solution that uses a one-time-use debit card number for online transactions. Will this make online payment safer? Let’s check it out.
Using HTTP is no longer an option for large or small websites, so why are 79 of the top 100 websites not using HTTPS? Let’s discuss!
Some companies are offering external GPUs that work much like how external hard drives do. Is this a veritable market? Let’s dig in deeper.
Apple has rejected the FBI’s request to create a back door for iOS. Here is what you need to know about the Apple vs. FBI saga.
The USB-C cable was designed to help pave the way for future devices that would require very versatile signalling and power transfers. So why are they, instead, frying laptops? Let’s find out.
Google is planning to follow Apple’s ways and wants to have greater control over the building process of its Nexus phone. Is this a good thing?
Video conferencing has come a long way from the days when software used to come across hitches precisely at the most inopportune moments. Let’s take a look at its promising future.
When it comes to browser security, Internet Explorer is far from the best or safest browser. As as matter of fact, it’s getting more dangerous! See how in this article.
Spear phishing is dangerous because it uses the rapport between an individual and an organization to accomplish its purpose. This article explains what it is and how to protect yourself.
Companies like Symantec and FireEye have shown concern regarding malware on Apple devices, particularly iOS. This brings up a good point: Apple users should start thinking more about security. Here’s why.
Are you familiar with state-sponsored hacking? If not, this article will open your eyes and explain why it will continue to be a growing phenomenon as the Internet becomes more ubiquitous in our lives.
Following in YouTube’s steps, Facebook recently announced that it has stopped using Flash entirely for videos across the entire social network. It’s time to explain why Flash is being dumped in favor of HTML5.
Since 2006, Facebook has established a minimum age of 13 for the use of its services. Do you think that setting a minimum age like this is wise? Let’s discuss.
The Secure Hash Algorithm (SHA) has been an instrumental tool in the fight against hackers. While SHA-1 has been the standard, it’s now being abandoned for SHA-2. Here’s why.