We’ve seen police attempt to crack phones that belong to living suspects with little success, but what about dead people? Can police search a phone without a warrant after death?
While Chrome extensions have allowed us to have a great deal of flexibility to customize the browser, beware, as you might have installed a fake ad-blocker extension you thought would protect you!
Facebook is now discussing a new subscription model that might help it avoid future privacy problems, but would a subscription model work? Let’s explore this option.
Have you ever sent a message that you’d like to take back? Facebook might actually include this feature in Messenger, allowing people to “unsend” messages.
Facebook’s mobile app was found to have collected, and continues to collect, phone call metadata. Here’s how to stop Facebook from collecting your phone call data.
The General Data Protection Regulation (GDPR) allows people living in the EU to have more control over the data collected on them from websites. Here is what you need to know about GDPR and how it affects you.
Netflix started a “bug bounty” program that compensates hackers who report vulnerabilities to the company. The question, however, is whether bug bounty programs are really more effective than having an in-house penetration testing team.
Sierra Leone participated in the first ever blockchain election in March 2018. Does simply using a blockchain to power the voting process really provide such a secure environment? Let’s find out.
A set of vulnerabilities in AMD’s latest line of processors was discovered by a company called CTS-Labs. Here’s what you need to know about AMD’s vulnerability report.
The latest “Right to Repair” legislation has several implications for customers but also for the market as a whole, all of which warrants a significant amount of discussion regarding all these effects.
While the smartphone era has led to an explosion of innovation, the amount of “new” seems to be running out, as manufacturers in 2018 are having trouble attracting new buyers.
Two-factor authentication has been a very powerful way to make sure that you’re the correct person to log in to your data and access data, but there’s some bad news: it’s flawed.
Windows 10’s various power options won’t let you squeeze every bit of performance out of the system you have. A new Ultimate Performance feature introduced by Microsoft in Windows 10 can change all of this.
A massive amount of code from iOS was leaked to the public. Find out how this leak will affect iPhone and iPad users.
If there’s one frustration people often have, it’s that they don’t know what news sources they can trust. YouTube took this into account when it planned a new feature that will label state-funded news sources.
It seems as though hacking is getting more rampant, and many companies are scrambling to find out what to do to prevent falling victim to the onslaught of attacks. It’s time for zero trust models.
Facebook is considering letting its users define what exactly is or isn’t fake news, through a series of surveys. It’s time to explore the idea in depth and consider the potential pitfalls in this strategy.
With the recent videos on “Tide pod challenge” spreading virally, YouTube has to lay down the ax on these kinds of videos. Did YouTube do the right thing?