Like all other online accounts, your Gmail account too, is vulnerable to hacker attack and other assorted cyber threats. These if carried out successfully, could make your life quite miserable as most of our confidential and sensitive information is generally stored...
Before elaborating on risky messaging apps that we use, it would be prudent to define a risky app first. Apps may be malicious or risky. The latter is one that isn’t essentially bad or good in binary terms, but may be...
WPA2 encryption has been breached. The crack exposes WiFi users to various security threats. A Belgian security researcher from the University of Leuven, named Mathy Vanhoef, has discovered a serious flaw in the widely uses WPA2 WiFi security protocol. The flaw is...
While Amazon, Apple, and Google have been storming the scene with their respective streaming devices the last few years, their older cousin Roku has been quietly upping its game. Roku has been around from 2012, when neither Google Chromecast nor Amazon...
Ever wondered how Facebook makes money? Facebook is a great platform that provides a lot of entertainment for free. But what exactly is the price for “free?” As you might know, Facebook is a self-sustained ecosystem of its own. When you...
Bitcoin and other cryptocurrencies have been a major phenomenon the last few years, drawing attention technology powering them: blockchain. This decentralized digital ledger of cryptocurrency transactions has started to be used in several other fields too. Many people don’t actually realize...
Bitcoin is a popular cryptocurrency. Many people have invested in Bitcoin and earned money. But is it possible to stop Bitcoin? The truth is that many big governments don’t like Bitcoin because it threatens their monopoly over printing money. And nobody...
Can the Internet (IoT) really kill you? As technology is proceeding, we are connected to the internet in many ways. There are smart TVs, smart fridges, and complete home systems connected to an app on your phone. Your entire home behaves...
You must have noticed how the ads you see online are magically tailored to your interests. On the Internet, nothing is a coincidence. If you wonder how the Web knows so much about you and your interests, it is by violating...
A virtual private network, VPN for short, is a private network system that was and still is used primarily by companies to protect their outgoing and incoming Internet traffic. In essence, these companies use VPN as a tool to protect their privacy...
The Chinese Firewall is getting more and more impenetrable. The Chinese Industry & Information Technology Ministry of has formally announced that it will launch a nationwide cleanup operation of all Internet access services spanning a 14-month period. This would also encompass...
Ever noticed how you start seeing ads for furniture after you searched for a couch online? Or adverts of clothes after you Google for some dress designs? The sites you visit know a lot about you. And it’s not just Google...