New hackers now turn their gaze towards mobile phones which boast a decent amount of performance for their chips. It’s time to arm yourself to combat the issue.
With the touchscreen keyboards of smartphones today. that doesn’t stop other initiatives from trying to bring phones with a keyboard back. But will it fly with the public?
Windows 10 has plenty of features that helps SSDs operate to their full potential, but it doesn’t always enable them by default. This will show how to unlock the full potential of your SSD!
We’ve seen police attempt to crack phones that belong to living suspects with little success, but what about dead people? Can police search a phone without a warrant after death?
While Chrome extensions have allowed us to have a great deal of flexibility to customize the browser, beware, as you might have installed a fake ad-blocker extension you thought would protect you!
Facebook is now discussing a new subscription model that might help it avoid future privacy problems, but would a subscription model work? Let’s explore this option.
Have you ever sent a message that you’d like to take back? Facebook might actually include this feature in Messenger, allowing people to “unsend” messages.
Facebook’s mobile app was found to have collected, and continues to collect, phone call metadata. Here’s how to stop Facebook from collecting your phone call data.
The General Data Protection Regulation (GDPR) allows people living in the EU to have more control over the data collected on them from websites. Here is what you need to know about GDPR and how it affects you.
Netflix started a “bug bounty” program that compensates hackers who report vulnerabilities to the company. The question, however, is whether bug bounty programs are really more effective than having an in-house penetration testing team.
Sierra Leone participated in the first ever blockchain election in March 2018. Does simply using a blockchain to power the voting process really provide such a secure environment? Let’s find out.
A set of vulnerabilities in AMD’s latest line of processors was discovered by a company called CTS-Labs. Here’s what you need to know about AMD’s vulnerability report.
The latest “Right to Repair” legislation has several implications for customers but also for the market as a whole, all of which warrants a significant amount of discussion regarding all these effects.
While the smartphone era has led to an explosion of innovation, the amount of “new” seems to be running out, as manufacturers in 2018 are having trouble attracting new buyers.
Two-factor authentication has been a very powerful way to make sure that you’re the correct person to log in to your data and access data, but there’s some bad news: it’s flawed.
Windows 10’s various power options won’t let you squeeze every bit of performance out of the system you have. A new Ultimate Performance feature introduced by Microsoft in Windows 10 can change all of this.
A massive amount of code from iOS was leaked to the public. Find out how this leak will affect iPhone and iPad users.
If there’s one frustration people often have, it’s that they don’t know what news sources they can trust. YouTube took this into account when it planned a new feature that will label state-funded news sources.