One of the simplest approaches to security is air-gapping (disconnecting the system from the Internet entirely). But, is an air-gapped computer hacker-proof? Let’s find out.
As the race for smaller hardware continues, let’s dive into what this means and what challenges manufacturers face in making molecular hardware a reality.
Is it practical to attempt to police speech on the internet – whatever form this kind of action may take? Should the Internet be policed? Let’s discuss.
Many hardware manufacturers have pushed their research departments to come up with ways to fit more hardware into smaller spaces. Is this a good thing?
A number of viruses evade security software detection causing huge problems. So we ask: are anti-malware applications worth the trouble anymore?
The Email Privacy Act forces the government to seek warrants before asking tech companies for emails. Should this be the same for an individual’s personal emails?
Some people have no interest in running mobile apps on their desktop while others welcome it. Here’s a look at why some want to run mobile apps on their PCs.
Google seems to know everything, including where your home is located. This info is based on your router, but how does Google know where your WiFi router is anyway and can you stop this?
A new bill has entered the U.S. Congress for a new law requiring the presentation of identification before purchasing prepaid cards. Do you think this is a good thing?
A startup called Privacy has created a solution that uses a one-time-use debit card number for online transactions. Will this make online payment safer? Let’s check it out.
Using HTTP is no longer an option for large or small websites, so why are 79 of the top 100 websites not using HTTPS? Let’s discuss!
Some companies are offering external GPUs that work much like how external hard drives do. Is this a veritable market? Let’s dig in deeper.
Apple has rejected the FBI’s request to create a back door for iOS. Here is what you need to know about the Apple vs. FBI saga.
The USB-C cable was designed to help pave the way for future devices that would require very versatile signalling and power transfers. So why are they, instead, frying laptops? Let’s find out.
Google is planning to follow Apple’s ways and wants to have greater control over the building process of its Nexus phone. Is this a good thing?
Video conferencing has come a long way from the days when software used to come across hitches precisely at the most inopportune moments. Let’s take a look at its promising future.
When it comes to browser security, Internet Explorer is far from the best or safest browser. As as matter of fact, it’s getting more dangerous! See how in this article.
Spear phishing is dangerous because it uses the rapport between an individual and an organization to accomplish its purpose. This article explains what it is and how to protect yourself.