A number of viruses evade security software detection causing huge problems. So we ask: are anti-malware applications worth the trouble anymore?
The Email Privacy Act forces the government to seek warrants before asking tech companies for emails. Should this be the same for an individual’s personal emails?
Some people have no interest in running mobile apps on their desktop while others welcome it. Here’s a look at why some want to run mobile apps on their PCs.
Google seems to know everything, including where your home is located. This info is based on your router, but how does Google know where your WiFi router is anyway and can you stop this?
A new bill has entered the U.S. Congress for a new law requiring the presentation of identification before purchasing prepaid cards. Do you think this is a good thing?
A startup called Privacy has created a solution that uses a one-time-use debit card number for online transactions. Will this make online payment safer? Let’s check it out.
Using HTTP is no longer an option for large or small websites, so why are 79 of the top 100 websites not using HTTPS? Let’s discuss!
Some companies are offering external GPUs that work much like how external hard drives do. Is this a veritable market? Let’s dig in deeper.
Apple has rejected the FBI’s request to create a back door for iOS. Here is what you need to know about the Apple vs. FBI saga.
The USB-C cable was designed to help pave the way for future devices that would require very versatile signalling and power transfers. So why are they, instead, frying laptops? Let’s find out.
Google is planning to follow Apple’s ways and wants to have greater control over the building process of its Nexus phone. Is this a good thing?
Video conferencing has come a long way from the days when software used to come across hitches precisely at the most inopportune moments. Let’s take a look at its promising future.
When it comes to browser security, Internet Explorer is far from the best or safest browser. As as matter of fact, it’s getting more dangerous! See how in this article.
Spear phishing is dangerous because it uses the rapport between an individual and an organization to accomplish its purpose. This article explains what it is and how to protect yourself.
Companies like Symantec and FireEye have shown concern regarding malware on Apple devices, particularly iOS. This brings up a good point: Apple users should start thinking more about security. Here’s why.
Are you familiar with state-sponsored hacking? If not, this article will open your eyes and explain why it will continue to be a growing phenomenon as the Internet becomes more ubiquitous in our lives.
Following in YouTube’s steps, Facebook recently announced that it has stopped using Flash entirely for videos across the entire social network. It’s time to explain why Flash is being dumped in favor of HTML5.
Since 2006, Facebook has established a minimum age of 13 for the use of its services. Do you think that setting a minimum age like this is wise? Let’s discuss.
The Secure Hash Algorithm (SHA) has been an instrumental tool in the fight against hackers. While SHA-1 has been the standard, it’s now being abandoned for SHA-2. Here’s why.
In the present the fax machine seems like a relic from a bygone era. Considering newer technology, is it still worth keeping around? Let’s discuss!
Facebook’s Live Streaming Service is an immersive and authentic way to connect with the public figures you care about in real-time. Here’s what you need to know about it.
What if we could charge our smartphone only once a week and have it last as long as the “dumb” phone? It could be happening soon.
Generally all online quizzes look the same; however, some might appear as apps that require certain permissions on Facebook for you to proceed. This presents significant privacy concerns. Here’s how to protect yourself.
Developers have released a new messenger system that runs on top of Tor. Here’s what you should know about this new messenger system for Tor.
A water cooling system for PC can be difficult to implement. Would a circulatory system that worked a lot like our own vascular systems be more efficient?
A recent trend has emerged in which attackers are now asking for ransoms in web attacks. This is also known as ransom attacks. Here’s what you need to know.
As of October 23, 2015, the BBC reports that all public posts on Facebook will be searchable. Here’s what you need to know and how to opt out of searchable public posts.
Tech support scams are the most common way that PC users, especially Windows users, are hoodwinked into paying cash. Here’s what you should know about them.
The system we used to manage our files have not changed since PC first appeared. This begs the question: Is our current file and folder system flawed? Can we do better?
Sometimes a website that you often visit on your desktop or laptop will take much longer to load on your mobile device. What’s that all about? Find out!
Google released Android Marshmallow recently. Here are some of the most interesting things that you can expect to see in phones running it.
There are many ISPs that have either not switched over to IPv6 or have only partially made the implementation. What’s the holdup? Should you be worried?
Many websites have declared war on ad blockers by claiming that their use drops their revenue. Are ad blockers really killing the Internet?
Facebook will soon add a dislike button to the platform. What exactly does the dislike button do for the most massive social network in the world? Let’s discuss.
Lenovo’s latest Yoga Tab 3 Pro tablet came with a small projector that is capable of displaying a 70-inch image onto surfaces. Is this a good idea? And is it useful?
Is 4K really a necessary resolution for a smartphone? Does this resolution even make a difference when placed side-to-side with previous high-end models?
The problem we face right now is that we do not have a clear line drawn on what “enough” data about an individual is. Where do we draw the limit on data collection?
The recent news is that Google will now be held by its new parent company – Alphabet. What is this all about? And what is Google Alphabet? Let’s find out.
Is internet slang going to mark the death of an objective standard for language?
Some are saying that a divorce must happen for Bitcoin to thrive, and its name will be Bitcoin XT. What effect will this have? Read on to find out.
Not all hackers are bad; some have a net positive effect on the Internet’s ecosystem as a whole. What motivates them? Can they be a force for good?
Swatting is a dangerous cyber crime that puts people in danger by reporting false crimes and deploying SWAT to their home. Many want justice for this. Should the police get involved?
Want to learn more about VoIP and VoLTE and see what makes them better and how they compare to older cellular networks? Read on to find out.
The amount of people with a tablet is about one-tenth of the world population; it’s slowly becoming a business-worthy item. Here’s why this device won’t die.
You probably have heard the term “cyber warfare” and wondered what it really means? This article explains what cyber warfare is and how it is used.
Graphene may have plenty of plaudits about its massively fluid electrical conductivity, but it is impossible to build CPU out of it. Here’s why!
The Google Brain team is working on artificial neural networks. Let’s see how it could affect the way that technology interacts with us in the near future.
Online reviews are great because they give you a supposedly accurate depiction of the product that you are going to buy. But can they really be trusted? Let’s find out.
Streaming sites have been seeing increased usage by people who wish to pay for unlimited media streaming. Are these services going to make piracy obsolete?
The severity of a DDoS attack could vary from a mild inconvenience to a total takedown of a server. But how large can it really get? Let’s find out here.