Facebook is considering letting its users define what exactly is or isn’t fake news, through a series of surveys. It’s time to explore the idea in depth and consider the potential pitfalls in this strategy.
With the recent videos on “Tide pod challenge” spreading virally, YouTube has to lay down the ax on these kinds of videos. Did YouTube do the right thing?
The 802.11ac WiFi standard was not enough for massive stadiums and large auditoriums with many users. This is where 802.11ax WiFi standard comes in. Find out how it works and what it has to offer.
2017 has been a very eventful year for the tech industry. Now, it’s time to refresh our memories and look back at everything that’s made a mark on the year.
Blockchain technology has always been associated with Bitcoin and other cryptocurrencies, but it is so much more than that. Find out how blockchain works and how it’s helping many industries operate more efficiently.
Facial recognition was touted as a secure authentication method by Apple, but the fact is that it is not as secure as you think. Here are some of its downsides that you should know about.
You keep your Bitcoin in a digital wallet, which is in some ways more dangerous than a physical one. Here are some ways that Bitcoins can be stolen.
Whenever a major company suffers a data breach, an amount of time seems to pass until the victims are informed. Why is this so? Let’s find out.
When you are online, your computer/browser gives your location away. Here’s how location tracking works over the Internet and how you can protect yourself.
The remote desktop protocol in Windows allows you and the hackers to gain access to your computer remotely. Learn why it’s a bad idea to use RDP in Windows.
If you are using Intel’s CPU on your computer, chances are you are open to a recent exploit. Here’s how the Intel’s CPU was hacked and what you can do about it.
Quantum computers can solve problems much faster than any classic computer, including cracking your encryption. How will this affect your security? Let’s find out!
Most of us are using smart devices with camera / microphone / location enabled, which makes a good surveillance program. How can we still preserve our privacy when it is traded for convenience?
Most people will find the term “tech fatigue” relatable to their situation. So what causes tech fatigue, and what is the cure for this? Let’s find out.
Some websites are using miner scripts that use their visitors’ computers to “mine” cryptocurrencies and make money. Here’s how you can prevent it.
A new WiFi vulnerability was uncovered, and it affected most, if not all, wireless routers. Here’s what you need to know about the Krack vulnerability.
Equifax suffered another setback when their website was hacked to redirect people to a malware site. What can you do when faced with redirect attacks?
Removing the 3.5 mm headphone jack from a smartphone seems more like a downgrade. What happened is a move towards more proprietary hardware and exclusivity.
We’re in an era where phones are several times more expensive than their “dumber” predecessors and that much more delicate as well. What gives?!
Facial recognition technology is now added to CCTV cameras, improving surveillance effectiveness. How does this impact you? Does it intrude on your privacy?
Twitter has been known for its 140-character limit. but it announced that it is extending the character limit to 280. Was this the right move? Let’s find out.
Budget phones are good for people who can’t afford the flagship phones; they are also beneficial to those who don’t buy them. Here’s why.
CCleaner was hacked and malware was included in their software update. How can you protect yourself when such a popular software gets hacked and malware gets into your system?
A new feature uncovered in Facebook is the ability to “snooze” or temporarily unfollow a friend. This feature might actually prove useful in the long term. Let’s find out more about it.
Both SD card and SSD use solid-state storage and have no moving parts. Examine SD card vs. SSD and learn why you can’t use one in place of other.
While VPN meant to secure your internet connection, it is not all roses. Here are some of the limitation of VPNs, and the ways to keep yourself safe.
SanDisk announced a massive storage capacity 400GB microSD card. Here is how it works, and the possibility of achieving an even larger storage.
Usenet has been used for a very long time, and now it has come back with a vengeance. Find out what Usenet is, how it works, and how it can benefit you.
A group of researchers have managed to create an automated spear phishing detection project. Learn how it works to combat spear phishing.
While we’re intensely focused on the positive aspect of self-driving vehicles, we often forget to look at the downsides that might come up along the way.
A new technology in Windows 10 can track your eye movements and allow you to navigate the PC. Is this eye tracking feature really useful or just a gimmick? Let’s find out.
The standard thought is that you need to always use the official charger to charge your phone or else it will damage your battery. How true is this? Let’s find out.
For those who are hesitant to do shopping online out of safety concerns, here are some ways to minimize the risks involved when making online transactions.
A new CIA leak has revealed that it can now infect air-gapped systems at will using a couple of cunning tactics and a USB thumb drive. Here’s how it works.
With Let’s Encrypt gaining popularity, many are wondering if free SSL certificates are better and can replace the commercial ones. Let’s find out!
Over a million laptops are stolen each year in the U.S. Learn the various ways to protect your laptop and prevent laptop theft.
You may have heard of DDos, or even encountered one before, and are looking for ways to counter it. Here’s how DDoS protection works and how you can counter it.
Intel has released the Intel Core i9 that boasts a whopping 18 cores. Why would a PC need that many cores, and why did Intel come up with this processor?
For the 30th anniversary of the GIF image format, let’s find out some fun facts about GIF that you probably don’t know.
With the WannaCry ransomware making the headlines, many people are wondering if Wanncry is able to infect Linux. The answer is yes, only if you allow it to.
The WannaCry ransomware managed to infect an unprecedented 230,000 systems spread across 150 countries. Find out what it is and how you can combat it.
Given that almost everything you do is being tracked, it’s normal to have privacy concerns. Here’re some ways you can minimize the amount of data apps collect from you.
With the release of the biometric debit card by MasterCard, the questions being asked are whether fingerprints are more secure than PIN numbers and if the technology is mature. Let’s find out the answers.
Google’s business model is advertisement, and the latest rumour is that Google is including an ad-blocker in Chrome. How will this change the game?
Blackberry won in an arbitration case against Qualcomm and has now $815 million in its pocket. This could lead the company to do a couple of great things.
After a long while, Ubuntu is looking to abandon Unity in favor of the Gnome desktop for Ubuntu 18.04. What does this mean, and what’s its impact to its users? Let’s find out.
Verizon and Comcast have both announced the launch of prepaid Internet broadband packages. This might actually help invigorate innovation in the United States’ Internet market.
U.S. Congress has repealed the FCC Internet Privacy Regulations to allow ISPs to sell customer data to advertisers. Should we enter panic mode without first examining the facts?
It’s been discovered that a bug in Lastpass browser extensions is leaking passwords. Here is what you need to know about the exploits and what you can do to protect yourself.
You probably know and have heard about “zero-day exploits,” but there are some ugly truths that you would rather not know as you get deeper into it. Here are some of them.