Miguel has been a business growth and technology expert for more than a decade and has written software for even longer. From his little castle in Romania, he presents cold and analytical perspectives to things that affect the tech world.
CCleaner was hacked and malware was included in their software update. How can you protect yourself when such a popular software gets hacked and malware gets into your system?
A new feature uncovered in Facebook is the ability to “snooze” or temporarily unfollow a friend. This feature might actually prove useful in the long term. Let’s find out more about it.
Usenet has been used for a very long time, and now it has come back with a vengeance. Find out what Usenet is, how it works, and how it can benefit you.
While we’re intensely focused on the positive aspect of self-driving vehicles, we often forget to look at the downsides that might come up along the way.
A new technology in Windows 10 can track your eye movements and allow you to navigate the PC. Is this eye tracking feature really useful or just a gimmick? Let’s find out.
The standard thought is that you need to always use the official charger to charge your phone or else it will damage your battery. How true is this? Let’s find out.
For those who are hesitant to do shopping online out of safety concerns, here are some ways to minimize the risks involved when making online transactions.
A new CIA leak has revealed that it can now infect air-gapped systems at will using a couple of cunning tactics and a USB thumb drive. Here’s how it works.
You may have heard of DDos, or even encountered one before, and are looking for ways to counter it. Here’s how DDoS protection works and how you can counter it.
Intel has released the Intel Core i9 that boasts a whopping 18 cores. Why would a PC need that many cores, and why did Intel come up with this processor?
With the WannaCry ransomware making the headlines, many people are wondering if Wanncry is able to infect Linux. The answer is yes, only if you allow it to.
Given that almost everything you do is being tracked, it’s normal to have privacy concerns. Here’re some ways you can minimize the amount of data apps collect from you.
With the release of the biometric debit card by MasterCard, the questions being asked are whether fingerprints are more secure than PIN numbers and if the technology is mature. Let’s find out the answers.
Blackberry won in an arbitration case against Qualcomm and has now $815 million in its pocket. This could lead the company to do a couple of great things.
After a long while, Ubuntu is looking to abandon Unity in favor of the Gnome desktop for Ubuntu 18.04. What does this mean, and what’s its impact to its users? Let’s find out.
Verizon and Comcast have both announced the launch of prepaid Internet broadband packages. This might actually help invigorate innovation in the United States’ Internet market.
U.S. Congress has repealed the FCC Internet Privacy Regulations to allow ISPs to sell customer data to advertisers. Should we enter panic mode without first examining the facts?
It’s been discovered that a bug in Lastpass browser extensions is leaking passwords. Here is what you need to know about the exploits and what you can do to protect yourself.
You probably know and have heard about “zero-day exploits,” but there are some ugly truths that you would rather not know as you get deeper into it. Here are some of them.
A massive leak of some of the CIA’s closely kept secrets stored in a repository known as “vault 7” has hit the wire. Here’s what you need to know, and worry about.
Chrome’s explosive growth is impressive, and it is not showing any sign of slowing down. What lessons does it teach us about how browsers should cater to the average user, which is you and me?
A major bug in Cloudflare has caused a massive leak of private data from millions of websites. Here’s what you need to do in the aftermath of CloudBleed.
The U2F security keys are inserted into your USB slot and allow you to log in quickly and easily. But are they really useful and do they keep you safe? Let’s find out.
As more and more car manufacturers start to add tech in cars, it is now possible to remote start, locate and summon your car with your phone. But how safe is it? Let’s find out.
In the late ’90s antivirus was almost a necessity in every computer. In these modern days are AVs still able to protect you from threats as advertised? Is antivirus relevant anymore?
If you are hearing noises coming out of your computer, here’s a guide to help you diagnose computer noises, isolate the problem and repair it quickly and efficiently.
The Chinese government intends to crack down on unauthorized virtual private networks in an effort to more easily regulate the Internet within its borders. Can it really enforce a VPN Crackdown? Let’s check it out.
Speculation suggests Samsung and LG are producing foldable smartphones in late 2017. Let’s see how this might be a decent idea and some of the caveats it may have.
With the evolution of consumer technology reaching a tipping point, perhaps it’s time we looked at what we should be thinking when buying new technology.
With a new set of rules that would compel your ISP to ask questions before gathering your data, is it actually going to protect privacy for people on the Web?
TOR has become such a popular application that many people trust it completely without knowing how it works. Here are some of the common myths about TOR you should know.
Nvidia’s NVENC allows the use the GPU to encode video streams so as to reduce video conversion time. Here’s how to get Nvidia’s NVENC working in Ubuntu.
Can image files like JPEGs or PNG spread viruses? We tend to believe not, but here’s an incident on how images are used to infect computers through social media. Let’s find out!
With Skype removing the need to have user accounts to participate in conversations, user accounts might become obsolete in the near future. Here’s why.
Even though Microsoft is actively pushing Windows 10, its market share is still far behind Windows 7. Did Windows 10 flop? How did things get this way?
A lot of high-end laptops or CPU/GPU coolers are using “vapor chamber” as a selling point. How is this better than the traditional cooling techniques? Let’s find out.
Yahoo submitted a patent for a “smart billboard” that uses demographics to show targeted ads to passerby. Is this “smart billboard” considered an invasion of privacy? Let’s find out.
The United States has relinquished control of IANA to ICANN, effectively giving up its influential stake on the Internet. What does this mean? Did The U.S. just give up control of the Internet? Let’s find out!