Facebook’s mobile app was found to have collected, and continues to collect, phone call metadata. Here’s how to stop Facebook from collecting your phone call data.
Netflix started a “bug bounty” program that compensates hackers who report vulnerabilities to the company. The question, however, is whether bug bounty programs are really more effective than having an in-house penetration testing team.
Sierra Leone participated in the first ever blockchain election in March 2018. Does simply using a blockchain to power the voting process really provide such a secure environment? Let’s find out.
A set of vulnerabilities in AMD’s latest line of processors was discovered by a company called CTS-Labs. Here’s what you need to know about AMD’s vulnerability report.
The latest “Right to Repair” legislation has several implications for customers but also for the market as a whole, all of which warrants a significant amount of discussion regarding all these effects.
While the smartphone era has led to an explosion of innovation, the amount of “new” seems to be running out, as manufacturers in 2018 are having trouble attracting new buyers.
Two-factor authentication has been a very powerful way to make sure that you’re the correct person to log in to your data and access data, but there’s some bad news: it’s flawed.
Windows 10’s various power options won’t let you squeeze every bit of performance out of the system you have. A new Ultimate Performance feature introduced by Microsoft in Windows 10 can change all of this.
A massive amount of code from iOS was leaked to the public. Find out how this leak will affect iPhone and iPad users.
If there’s one frustration people often have, it’s that they don’t know what news sources they can trust. YouTube took this into account when it planned a new feature that will label state-funded news sources.
It seems as though hacking is getting more rampant, and many companies are scrambling to find out what to do to prevent falling victim to the onslaught of attacks. It’s time for zero trust models.
Facebook is considering letting its users define what exactly is or isn’t fake news, through a series of surveys. It’s time to explore the idea in depth and consider the potential pitfalls in this strategy.
With the recent videos on “Tide pod challenge” spreading virally, YouTube has to lay down the ax on these kinds of videos. Did YouTube do the right thing?
The 802.11ac WiFi standard was not enough for massive stadiums and large auditoriums with many users. This is where 802.11ax WiFi standard comes in. Find out how it works and what it has to offer.
2017 has been a very eventful year for the tech industry. Now, it’s time to refresh our memories and look back at everything that’s made a mark on the year.
Blockchain technology has always been associated with Bitcoin and other cryptocurrencies, but it is so much more than that. Find out how blockchain works and how it’s helping many industries operate more efficiently.
Facial recognition was touted as a secure authentication method by Apple, but the fact is that it is not as secure as you think. Here are some of its downsides that you should know about.
You keep your Bitcoin in a digital wallet, which is in some ways more dangerous than a physical one. Here are some ways that Bitcoins can be stolen.
Whenever a major company suffers a data breach, an amount of time seems to pass until the victims are informed. Why is this so? Let’s find out.
When you are online, your computer/browser gives your location away. Here’s how location tracking works over the Internet and how you can protect yourself.
The remote desktop protocol in Windows allows you and the hackers to gain access to your computer remotely. Learn why it’s a bad idea to use RDP in Windows.
If you are using Intel’s CPU on your computer, chances are you are open to a recent exploit. Here’s how the Intel’s CPU was hacked and what you can do about it.
Quantum computers can solve problems much faster than any classic computer, including cracking your encryption. How will this affect your security? Let’s find out!
Most of us are using smart devices with camera / microphone / location enabled, which makes a good surveillance program. How can we still preserve our privacy when it is traded for convenience?
Most people will find the term “tech fatigue” relatable to their situation. So what causes tech fatigue, and what is the cure for this? Let’s find out.
Some websites are using miner scripts that use their visitors’ computers to “mine” cryptocurrencies and make money. Here’s how you can prevent it.
A new WiFi vulnerability was uncovered, and it affected most, if not all, wireless routers. Here’s what you need to know about the Krack vulnerability.
Equifax suffered another setback when their website was hacked to redirect people to a malware site. What can you do when faced with redirect attacks?
Removing the 3.5 mm headphone jack from a smartphone seems more like a downgrade. What happened is a move towards more proprietary hardware and exclusivity.
We’re in an era where phones are several times more expensive than their “dumber” predecessors and that much more delicate as well. What gives?!
Facial recognition technology is now added to CCTV cameras, improving surveillance effectiveness. How does this impact you? Does it intrude on your privacy?
Twitter has been known for its 140-character limit. but it announced that it is extending the character limit to 280. Was this the right move? Let’s find out.
Budget phones are good for people who can’t afford the flagship phones; they are also beneficial to those who don’t buy them. Here’s why.
CCleaner was hacked and malware was included in their software update. How can you protect yourself when such a popular software gets hacked and malware gets into your system?
A new feature uncovered in Facebook is the ability to “snooze” or temporarily unfollow a friend. This feature might actually prove useful in the long term. Let’s find out more about it.
Both SD card and SSD use solid-state storage and have no moving parts. Examine SD card vs. SSD and learn why you can’t use one in place of other.
While VPN meant to secure your internet connection, it is not all roses. Here are some of the limitation of VPNs, and the ways to keep yourself safe.
SanDisk announced a massive storage capacity 400GB microSD card. Here is how it works, and the possibility of achieving an even larger storage.
Usenet has been used for a very long time, and now it has come back with a vengeance. Find out what Usenet is, how it works, and how it can benefit you.
A group of researchers have managed to create an automated spear phishing detection project. Learn how it works to combat spear phishing.
While we’re intensely focused on the positive aspect of self-driving vehicles, we often forget to look at the downsides that might come up along the way.
A new technology in Windows 10 can track your eye movements and allow you to navigate the PC. Is this eye tracking feature really useful or just a gimmick? Let’s find out.
The standard thought is that you need to always use the official charger to charge your phone or else it will damage your battery. How true is this? Let’s find out.
For those who are hesitant to do shopping online out of safety concerns, here are some ways to minimize the risks involved when making online transactions.
A new CIA leak has revealed that it can now infect air-gapped systems at will using a couple of cunning tactics and a USB thumb drive. Here’s how it works.
With Let’s Encrypt gaining popularity, many are wondering if free SSL certificates are better and can replace the commercial ones. Let’s find out!
Over a million laptops are stolen each year in the U.S. Learn the various ways to protect your laptop and prevent laptop theft.
You may have heard of DDos, or even encountered one before, and are looking for ways to counter it. Here’s how DDoS protection works and how you can counter it.
Intel has released the Intel Core i9 that boasts a whopping 18 cores. Why would a PC need that many cores, and why did Intel come up with this processor?
For the 30th anniversary of the GIF image format, let’s find out some fun facts about GIF that you probably don’t know.