A massive leak of some of the CIA’s closely kept secrets stored in a repository known as “vault 7” has hit the wire. Here’s what you need to know, and worry about.
Chrome’s explosive growth is impressive, and it is not showing any sign of slowing down. What lessons does it teach us about how browsers should cater to the average user, which is you and me?
A major bug in Cloudflare has caused a massive leak of private data from millions of websites. Here’s what you need to do in the aftermath of CloudBleed.
The U2F security keys are inserted into your USB slot and allow you to log in quickly and easily. But are they really useful and do they keep you safe? Let’s find out.
As more and more car manufacturers start to add tech in cars, it is now possible to remote start, locate and summon your car with your phone. But how safe is it? Let’s find out.
Did you know that wearing headphones for a long time can cause hearing loss and make you deaf? Here’s what can you do to prevent hearing loss.
In the late ’90s antivirus was almost a necessity in every computer. In these modern days are AVs still able to protect you from threats as advertised? Is antivirus relevant anymore?
If you are hearing noises coming out of your computer, here’s a guide to help you diagnose computer noises, isolate the problem and repair it quickly and efficiently.
The Chinese government intends to crack down on unauthorized virtual private networks in an effort to more easily regulate the Internet within its borders. Can it really enforce a VPN Crackdown? Let’s check it out.
Since 2007 the ubiquity of “https://” in URLs has increased almost exponentially. Is using HTTPS everywhere necessarily a good thing?
Speculation suggests Samsung and LG are producing foldable smartphones in late 2017. Let’s see how this might be a decent idea and some of the caveats it may have.
With the evolution of consumer technology reaching a tipping point, perhaps it’s time we looked at what we should be thinking when buying new technology.
With a new set of rules that would compel your ISP to ask questions before gathering your data, is it actually going to protect privacy for people on the Web?
We have seen great technologies leap foward in 2016. As 2017 approaches, we must discuss what top tech trends are in store for us in the year to come!
TOR has become such a popular application that many people trust it completely without knowing how it works. Here are some of the common myths about TOR you should know.
Nvidia’s NVENC allows the use the GPU to encode video streams so as to reduce video conversion time. Here’s how to get Nvidia’s NVENC working in Ubuntu.
There are plenty of features in VLC player. Here are a few more hidden gems that really demonstrate just how amazing VLC is. Check them out.
Can image files like JPEGs or PNG spread viruses? We tend to believe not, but here’s an incident on how images are used to infect computers through social media. Let’s find out!