The USB-C cable was designed to help pave the way for future devices that would require very versatile signalling and power transfers. So why are they, instead, frying laptops? Let’s find out.
Google is planning to follow Apple’s ways and wants to have greater control over the building process of its Nexus phone. Is this a good thing?
Video conferencing has come a long way from the days when software used to come across hitches precisely at the most inopportune moments. Let’s take a look at its promising future.
When it comes to browser security, Internet Explorer is far from the best or safest browser. As as matter of fact, it’s getting more dangerous! See how in this article.
Spear phishing is dangerous because it uses the rapport between an individual and an organization to accomplish its purpose. This article explains what it is and how to protect yourself.
Companies like Symantec and FireEye have shown concern regarding malware on Apple devices, particularly iOS. This brings up a good point: Apple users should start thinking more about security. Here’s why.
Are you familiar with state-sponsored hacking? If not, this article will open your eyes and explain why it will continue to be a growing phenomenon as the Internet becomes more ubiquitous in our lives.
Following in YouTube’s steps, Facebook recently announced that it has stopped using Flash entirely for videos across the entire social network. It’s time to explain why Flash is being dumped in favor of HTML5.
Since 2006, Facebook has established a minimum age of 13 for the use of its services. Do you think that setting a minimum age like this is wise? Let’s discuss.
The Secure Hash Algorithm (SHA) has been an instrumental tool in the fight against hackers. While SHA-1 has been the standard, it’s now being abandoned for SHA-2. Here’s why.
In the present the fax machine seems like a relic from a bygone era. Considering newer technology, is it still worth keeping around? Let’s discuss!
Facebook’s Live Streaming Service is an immersive and authentic way to connect with the public figures you care about in real-time. Here’s what you need to know about it.
What if we could charge our smartphone only once a week and have it last as long as the “dumb” phone? It could be happening soon.
Generally all online quizzes look the same; however, some might appear as apps that require certain permissions on Facebook for you to proceed. This presents significant privacy concerns. Here’s how to protect yourself.
Developers have released a new messenger system that runs on top of Tor. Here’s what you should know about this new messenger system for Tor.
A water cooling system for PC can be difficult to implement. Would a circulatory system that worked a lot like our own vascular systems be more efficient?
A recent trend has emerged in which attackers are now asking for ransoms in web attacks. This is also known as ransom attacks. Here’s what you need to know.
As of October 23, 2015, the BBC reports that all public posts on Facebook will be searchable. Here’s what you need to know and how to opt out of searchable public posts.