If you’ve used Apple Pay before, you already have a good idea of how the Apple Credit Card works, since it’s just a card optimized for use with iPhones.
USB Power Delivery is designed to be a single charging standard that provides a safe and efficient way to push the limits of voltage and current to devices.
A VPN is currently the best way to protect your device from hacking, DNS/IP address leaks and ISP surveillance. Learn what a VPN is and how it can protect you.
If you’ve ever formatted a hard drive or USB thumb drive, you might have seen the “Allocation Unit Size” setting. What is this, and can you change it? Let’s find out.
Modern video compression algorithms aren’t the same as the image compression algorithms you might be familiar with. Here’s how video compression works.
Thieves can easily steal information from your credit cards if the card has an embedded RFID chip. This is where an RFID blocking wallet is useful.
You’ve probably noticed that many flagship phones nowadays come with a time-of-flight camera. But what is a time-of-flight camera, and how does it work?
While the inner mechanisms of cryptocurrency are complex, buying and using it is actually very easy. Here is how you can buy bitcoin and start using it.
Serverless computing is a new trend that allows developers to host their apps and websites without having to run or maintain a server. Find out how it works here.
Using a dark theme is said to be better for eyesight and battery life; how accurate is this? Here we will debunk the myths about dark themes.
Different codecs, like Dobly Atmos and DTS:X, have different surround-sound capabilities and support different types of hardware used in higher-end home theater systems.
The accelerometer is the component in your phone that detects if you are holding it upright or sideways. Find out how an accelerometer works in a smartphone.
Bluetooth 5.1 is here, and it comes with handy improvements. This short primer on Bluetooth 5.1 shows how it’s different from the previous standard.
Chances are that some of your data has been stolen. There’s a good chance it was encrypted, but how secure is your stolen encrypted data?
You may have come across the term “ping,” but what is a “ping” really? What does it mean in the computing world, and why does it have such an odd name?
There are various methods used to safely store your password in a web server. Here we show how password hashing, encryption and storage works.
From analog to digital, there are quite a few audio formats that are still in use today. Should you use Digital (S/PDIF), HDMI or just plain analog? Let’s check it out.
Technology products are designed to have a short lifespan, whether you like it or not. There is some rationale behind them, though a little outrage over planned obsolescence is certainly justified.
Sandboxing is a tool used by macOS to limit the damage that a hijacked app can do. Here is how macOS app sandboxing works to protect its users.
The news is packed with reports of huge data breaches, and they never seem to cease. This is a quick look at how data breaches work and why it is impossible to eradicate them.
Ergonomics is about decreasing strain by ensuring safe and optimal working conditions. Here are nine great ergonomic improvements to get you started.
A newer tactic used by scammers is to get you to send them gift card rather than bank transfer. Find out how gift card scammer works and how to protect yourself.
Robotic process automation and artificial intelligence are starting to take over ever-increasing levels of knowledge work. Check out their differences and how they affect you.
Did you recently access the Internet on a commercial flight and wonder how you are able to connect to the Web at such a high altitude? Here’s how airplane Wi-Fi works.
Ethical hackers are people who hack for a good cause. These people use their hacking skills to uncover security flaws of a website/app. Find out how ethical hacking works.
Bluetooth is super short range, flakey, moody, and generally a bad connection protocol. Find out how Bluetooth works and how to improve your Bluetooth experience.
What happens if viruses change their “signatures” to avoid detection by antiviruses software? This is what polymorphic and metamorphic malware are about.
While bone conduction technology’s been around for a while, headphones based on it are starting to take off. Learn what bone conduction tech is and where it’s being used.
Predictive analytics analyzes data to figure out what might happen in the future. How does predictive analytics really work, and how reliable are its forecasts?
We know that Google and Amazon have algorithms that give us updates, search results, and product recommendations, but what does that actually mean? What qualifies as an algorithm?
Solid-state batteries are smaller, lighter, and provide greater power density than lithium-ion batteries based on liquid electrolytes.
Recently, BitDefender released an estimate of the ransom made by the popular GandCrab ransomware, and the figures were a little worryisome.
While Wi-Fi 6 brings faster speed to your wireless devices, there is another Wi-Fi standard, WiGig, that is even faster. Find out what WiGig is and its limitations.
The dopamine that we get from video games and the techniques we’ve devised to get that dopamine lie at the root of both good and addictive game design.
There are many different image file formats, and it can be confusing. Check out the differences between these image file formats and learn which one to use.
Wi-Fi 6 is the soon-to-be-released, newest version of Wi-Fi, which is faster and better. Find out what Wi-Fi 6 is and how it improves Wi-Fi performance.
Many websites and apps come with dark pattern interfaces to confuse and trick their users. Find out what “dark patterns” are and how they are used to trick people.
You might be surprised to learn that different mobile network operators are sharing the same infrastructure. This is known as a piggybacking mobile network. Find out more about it here.
Data: companies want it, users have it, and it’s valuable. But it’s not often clear what user data consists of, where it goes, and how it’s profitable.
Have you wondered why you can’t access popular services like Facebook or WhatsApp in China? This is because of the great firewall of China. Learn more about it here.
A banking trojan disguises itself as a genuine app so as to access your banking details. Learn all about banking trojans and how to keep yourself safe.
Most of the new phones and computers you buy come with pre-installed software in them. This bloatware can be annoying at best and storage hogs at worst. But what can you do about it?
Blockchains and cryptocurrencies are parts of a cryptographically administrated and secured system. Despite being used as interchangeable terms, they’re not the same thing.
Code injection is an attack perpetrated by an attacker’s ability to inject and execute malicious code into an application. Here’s how code injection works in detail.
SIM hijacking has been around for a while, and its becoming a lot more popular for hackers to steal phone numbers and use them to gain access to accounts.
Nvidia revealed their newest lineup of graphics cards which include ray tracing. What exactly is ray tracing, and why is it so important to the future of gaming?
You have heard of virtualization everywhere, but what does it really mean? Find out here.
Deeplocker is an application made by IBM to demostrate how one software can use AI to turn itself into malware that strikes only the right people.
There are many apps that filter out blue light so you can sleep better at night. How can blue light hurt you? Do blue light filtering apps really work? Let’s find out.
Bluetooth Profiles are a set of rules that allow technology to complete a particular task. Here are some of the most commonly used Bluetooth Profiles on your mobile.