RFID Blocking Wallet: Are They Useful?

RFID Blocking Wallet: Are They Useful?

Thieves can easily steal information from your credit cards if the card has an embedded RFID chip. This is where an RFID blocking wallet is useful.

By Elsie Biage -
How to Buy Bitcoin

How to Buy Bitcoin

While the inner mechanisms of cryptocurrency are complex, buying and using it is actually very easy. Here is how you can buy bitcoin and start using it.

By Andrew Braun -
What Is Serverless Computing?

What Is Serverless Computing?

Serverless computing is a new trend that allows developers to host their apps and websites without having to run or maintain a server. Find out how it works here.

By Simon Batt -
Dolby Atmos vs DTS:X – Which Is Better?

Dolby Atmos vs DTS:X – Which Is Better?

Different codecs, like Dobly Atmos and DTS:X, have different surround-sound capabilities and support different types of hardware used in higher-end home theater systems.

By Alexander Fox -
Audio Wars: Digital (S/PDIF) vs. HDMI vs. Analog

Audio Wars: Digital (S/PDIF) vs. HDMI vs. Analog

From analog to digital, there are quite a few audio formats that are still in use today. Should you use Digital (S/PDIF), HDMI or just plain analog? Let’s check it out.

By Robert Zak -
The Pros and Cons of Your Technology’s Short Lifespan

The Pros and Cons of Your Technology’s Short Lifespan

Technology products are designed to have a short lifespan, whether you like it or not. There is some rationale behind them, though a little outrage over planned obsolescence is certainly justified.

By Andrew Braun -
How macOS App Sandboxing Protects Users

How macOS App Sandboxing Protects Users

Sandboxing is a tool used by macOS to limit the damage that a hijacked app can do. Here is how macOS app sandboxing works to protect its users.

By Alexander Fox -
Why Do Data Breaches Happen So Often?

Why Do Data Breaches Happen So Often?

The news is packed with reports of huge data breaches, and they never seem to cease. This is a quick look at how data breaches work and why it is impossible to eradicate them.

By Alexander Fox -
How Does Airplane Wi-Fi Work?

How Does Airplane Wi-Fi Work?

Did you recently access the Internet on a commercial flight and wonder how you are able to connect to the Web at such a high altitude? Here’s how airplane Wi-Fi works.

By Sayak Boral -
What is Polymorphic and Metamorphic Malware?

What is Polymorphic and Metamorphic Malware?

What happens if viruses change their “signatures” to avoid detection by antiviruses software? This is what polymorphic and metamorphic malware are about.

By Simon Batt -
What Does an Algorithm Look Like?

What Does an Algorithm Look Like?

We know that Google and Amazon have algorithms that give us updates, search results, and product recommendations, but what does that actually mean? What qualifies as an algorithm?

By Andrew Braun -
How Do Solid State Batteries Work?

How Do Solid State Batteries Work?

Solid-state batteries are smaller, lighter, and provide greater power density than lithium-ion batteries based on liquid electrolytes.

By Alexander Fox -
What Is a “Piggybacking” Mobile Network?

What Is a “Piggybacking” Mobile Network?

You might be surprised to learn that different mobile network operators are sharing the same infrastructure. This is known as a piggybacking mobile network. Find out more about it here.

By Simon Batt -
Why Does Everyone Want Your Data?

Why Does Everyone Want Your Data?

Data: companies want it, users have it, and it’s valuable. But it’s not often clear what user data consists of, where it goes, and how it’s profitable.

By Andrew Braun -
What Is “The Great Firewall of China”?

What Is “The Great Firewall of China”?

Have you wondered why you can’t access popular services like Facebook or WhatsApp in China? This is because of the great firewall of China. Learn more about it here.

By Simon Batt -
What Is a “Banking Trojan?”

What Is a “Banking Trojan?”

A banking trojan disguises itself as a genuine app so as to access your banking details. Learn all about banking trojans and how to keep yourself safe.

By Simon Batt -
What Is “Bloatware,” and Why Is It Installed?

What Is “Bloatware,” and Why Is It Installed?

Most of the new phones and computers you buy come with pre-installed software in them. This bloatware can be annoying at best and storage hogs at worst. But what can you do about it?

By Simon Batt -
How Does Code Injection Work?

How Does Code Injection Work?

Code injection is an attack perpetrated by an attacker’s ability to inject and execute malicious code into an application. Here’s how code injection works in detail.

By Afam Onyimadu -
Do Blue Light Filtering Apps Really Work?

Do Blue Light Filtering Apps Really Work?

There are many apps that filter out blue light so you can sleep better at night. How can blue light hurt you? Do blue light filtering apps really work? Let’s find out.

By Andrew Braun -
How Music-Identification Apps Work

How Music-Identification Apps Work

Apps like Shazam and Soundhound are great for identifying music. They are easy to use, but how they work is a mystery.

By Andrew Braun -