Governments are notorious for their inability to catch up to the latest advancements in technology. Here are four outdated systems in the IT infrastructures that are still around.
A proposal was put forth to establish an online court for claims totaling up to 25,000 pounds. Would this be beneficial or spell disaster for the country?
Many people like the convenience of NFC payment but are not aware of the potential risk behind it. There are a couple of things you should know before you hop onto the bandwagon of convenience that contact-less payments provide.
For an attack carried out over the Internet to be successful, the hacker behind it has to be clever. And nothing demonstrates wit more clearly than the “man in the middle attack”. It’s time to make people aware of what a “man in the middle” (MiM) attack is and some best practices that could prevent it from being carried out.
The words “privacy” and “security” are often used interchangeably. Understanding the difference can help you make more educated decisions on how you choose to share your information and what software you choose to use.
Many people are using ad blockers to block ads. The question is will publishers be hurt by ad blockers and will users suffer as well?
Is the growing presence of the Internet and computing technology in our lives a net benefit or hindrance to social interaction? Is technology isolating us? Let’s discuss.
Google is constantly facing litigation for unfair competition, so do you think Google is competing unfairly or it is clear of any wrongdoing?
Almost everything that has made human progress possible is thanks to something Google likes to call a “moonshot.” What exactly does it mean? Let’s find out.
One of the simplest approaches to security is air-gapping (disconnecting the system from the Internet entirely). But, is an air-gapped computer hacker-proof? Let’s find out.
As the race for smaller hardware continues, let’s dive into what this means and what challenges manufacturers face in making molecular hardware a reality.
Is it practical to attempt to police speech on the internet – whatever form this kind of action may take? Should the Internet be policed? Let’s discuss.
Many hardware manufacturers have pushed their research departments to come up with ways to fit more hardware into smaller spaces. Is this a good thing?
A number of viruses evade security software detection causing huge problems. So we ask: are anti-malware applications worth the trouble anymore?
The Email Privacy Act forces the government to seek warrants before asking tech companies for emails. Should this be the same for an individual’s personal emails?
Some people have no interest in running mobile apps on their desktop while others welcome it. Here’s a look at why some want to run mobile apps on their PCs.
Google seems to know everything, including where your home is located. This info is based on your router, but how does Google know where your WiFi router is anyway and can you stop this?
A new bill has entered the U.S. Congress for a new law requiring the presentation of identification before purchasing prepaid cards. Do you think this is a good thing?