With the WannaCry ransomware making the headlines, many people are wondering if Wanncry is able to infect Linux. The answer is yes, only if you allow it to.
The WannaCry ransomware managed to infect an unprecedented 230,000 systems spread across 150 countries. Find out what it is and how you can combat it.
Given that almost everything you do is being tracked, it’s normal to have privacy concerns. Here’re some ways you can minimize the amount of data apps collect from you.
With the release of the biometric debit card by MasterCard, the questions being asked are whether fingerprints are more secure than PIN numbers and if the technology is mature. Let’s find out the answers.
Google’s business model is advertisement, and the latest rumour is that Google is including an ad-blocker in Chrome. How will this change the game?
Blackberry won in an arbitration case against Qualcomm and has now $815 million in its pocket. This could lead the company to do a couple of great things.
After a long while, Ubuntu is looking to abandon Unity in favor of the Gnome desktop for Ubuntu 18.04. What does this mean, and what’s its impact to its users? Let’s find out.
Verizon and Comcast have both announced the launch of prepaid Internet broadband packages. This might actually help invigorate innovation in the United States’ Internet market.
U.S. Congress has repealed the FCC Internet Privacy Regulations to allow ISPs to sell customer data to advertisers. Should we enter panic mode without first examining the facts?
It’s been discovered that a bug in Lastpass browser extensions is leaking passwords. Here is what you need to know about the exploits and what you can do to protect yourself.
You probably know and have heard about “zero-day exploits,” but there are some ugly truths that you would rather not know as you get deeper into it. Here are some of them.
A massive leak of some of the CIA’s closely kept secrets stored in a repository known as “vault 7” has hit the wire. Here’s what you need to know, and worry about.
Chrome’s explosive growth is impressive, and it is not showing any sign of slowing down. What lessons does it teach us about how browsers should cater to the average user, which is you and me?
A major bug in Cloudflare has caused a massive leak of private data from millions of websites. Here’s what you need to do in the aftermath of CloudBleed.
The U2F security keys are inserted into your USB slot and allow you to log in quickly and easily. But are they really useful and do they keep you safe? Let’s find out.
As more and more car manufacturers start to add tech in cars, it is now possible to remote start, locate and summon your car with your phone. But how safe is it? Let’s find out.
Did you know that wearing headphones for a long time can cause hearing loss and make you deaf? Here’s what can you do to prevent hearing loss.
In the late ’90s antivirus was almost a necessity in every computer. In these modern days are AVs still able to protect you from threats as advertised? Is antivirus relevant anymore?
If you are hearing noises coming out of your computer, here’s a guide to help you diagnose computer noises, isolate the problem and repair it quickly and efficiently.
The Chinese government intends to crack down on unauthorized virtual private networks in an effort to more easily regulate the Internet within its borders. Can it really enforce a VPN Crackdown? Let’s check it out.
Since 2007 the ubiquity of “https://” in URLs has increased almost exponentially. Is using HTTPS everywhere necessarily a good thing?
Speculation suggests Samsung and LG are producing foldable smartphones in late 2017. Let’s see how this might be a decent idea and some of the caveats it may have.
With the evolution of consumer technology reaching a tipping point, perhaps it’s time we looked at what we should be thinking when buying new technology.
With a new set of rules that would compel your ISP to ask questions before gathering your data, is it actually going to protect privacy for people on the Web?
TOR has become such a popular application that many people trust it completely without knowing how it works. Here are some of the common myths about TOR you should know.
Nvidia’s NVENC allows the use the GPU to encode video streams so as to reduce video conversion time. Here’s how to get Nvidia’s NVENC working in Ubuntu.
There are plenty of features in VLC player. Here are a few more hidden gems that really demonstrate just how amazing VLC is. Check them out.
Can image files like JPEGs or PNG spread viruses? We tend to believe not, but here’s an incident on how images are used to infect computers through social media. Let’s find out!
With Skype removing the need to have user accounts to participate in conversations, user accounts might become obsolete in the near future. Here’s why.
Even though Microsoft is actively pushing Windows 10, its market share is still far behind Windows 7. Did Windows 10 flop? How did things get this way?
Baggage loss in flights is still one of the biggest issue for airlines. Let’s see how new technology can help airlines stop losing your luggage.
A lot of high-end laptops or CPU/GPU coolers are using “vapor chamber” as a selling point. How is this better than the traditional cooling techniques? Let’s find out.
Yahoo submitted a patent for a “smart billboard” that uses demographics to show targeted ads to passerby. Is this “smart billboard” considered an invasion of privacy? Let’s find out.
With the rise of the Internet of Things, it is easier for botnets to carry out DDOS attacks. See how the IoT can become tomorrow’s botnets.
The United States has relinquished control of IANA to ICANN, effectively giving up its influential stake on the Internet. What does this mean? Did The U.S. just give up control of the Internet? Let’s find out!
Google releases software that can automatically generate a caption based on the objects and setting of an image. This may be a stepping stone towards something greater on the road to more advanced artificial intelligence.
Both AdBlock and Facebook consider each other a thorn in their side. But what do Facebook engineers do that frustrates AdBlock developers so much?
Governments are notorious for their inability to catch up to the latest advancements in technology. Here are four outdated systems in the IT infrastructures that are still around.
A proposal was put forth to establish an online court for claims totaling up to 25,000 pounds. Would this be beneficial or spell disaster for the country?
Many people like the convenience of NFC payment but are not aware of the potential risk behind it. There are a couple of things you should know before you hop onto the bandwagon of convenience that contact-less payments provide.
For an attack carried out over the Internet to be successful, the hacker behind it has to be clever. And nothing demonstrates wit more clearly than the “man in the middle attack”. It’s time to make people aware of what a “man in the middle” (MiM) attack is and some best practices that could prevent it from being carried out.
The words “privacy” and “security” are often used interchangeably. Understanding the difference can help you make more educated decisions on how you choose to share your information and what software you choose to use.
Many people are using ad blockers to block ads. The question is will publishers be hurt by ad blockers and will users suffer as well?
Is the growing presence of the Internet and computing technology in our lives a net benefit or hindrance to social interaction? Is technology isolating us? Let’s discuss.
Google is constantly facing litigation for unfair competition, so do you think Google is competing unfairly or it is clear of any wrongdoing?
Almost everything that has made human progress possible is thanks to something Google likes to call a “moonshot.” What exactly does it mean? Let’s find out.
One of the simplest approaches to security is air-gapping (disconnecting the system from the Internet entirely). But, is an air-gapped computer hacker-proof? Let’s find out.
As the race for smaller hardware continues, let’s dive into what this means and what challenges manufacturers face in making molecular hardware a reality.
Is it practical to attempt to police speech on the internet – whatever form this kind of action may take? Should the Internet be policed? Let’s discuss.
Many hardware manufacturers have pushed their research departments to come up with ways to fit more hardware into smaller spaces. Is this a good thing?