Miguel has been a business growth and technology expert for more than a decade and has written software for even longer. From his little castle in Romania, he presents cold and analytical perspectives to things that affect the tech world.
If there’s one frustration people often have, it’s that they don’t know what news sources they can trust. YouTube took this into account when it planned a new feature that will label state-funded news sources.
It seems as though hacking is getting more rampant, and many companies are scrambling to find out what to do to prevent falling victim to the onslaught of attacks. It’s time for zero trust models.
Facebook is considering letting its users define what exactly is or isn’t fake news, through a series of surveys. It’s time to explore the idea in depth and consider the potential pitfalls in this strategy.
With the recent videos on “Tide pod challenge” spreading virally, YouTube has to lay down the ax on these kinds of videos. Did YouTube do the right thing?
The 802.11ac WiFi standard was not enough for massive stadiums and large auditoriums with many users. This is where 802.11ax WiFi standard comes in. Find out how it works and what it has to offer.
Blockchain technology has always been associated with Bitcoin and other cryptocurrencies, but it is so much more than that. Find out how blockchain works and how it’s helping many industries operate more efficiently.
Facial recognition was touted as a secure authentication method by Apple, but the fact is that it is not as secure as you think. Here are some of its downsides that you should know about.
When you are online, your computer/browser gives your location away. Here’s how location tracking works over the Internet and how you can protect yourself.
The remote desktop protocol in Windows allows you and the hackers to gain access to your computer remotely. Learn why it’s a bad idea to use RDP in Windows.
If you are using Intel’s CPU on your computer, chances are you are open to a recent exploit. Here’s how the Intel’s CPU was hacked and what you can do about it.
Quantum computers can solve problems much faster than any classic computer, including cracking your encryption. How will this affect your security? Let’s find out!
Most of us are using smart devices with camera / microphone / location enabled, which makes a good surveillance program. How can we still preserve our privacy when it is traded for convenience?
Most people will find the term “tech fatigue” relatable to their situation. So what causes tech fatigue, and what is the cure for this? Let’s find out.
A new WiFi vulnerability was uncovered, and it affected most, if not all, wireless routers. Here’s what you need to know about the Krack vulnerability.
Removing the 3.5 mm headphone jack from a smartphone seems more like a downgrade. What happened is a move towards more proprietary hardware and exclusivity.
Facial recognition technology is now added to CCTV cameras, improving surveillance effectiveness. How does this impact you? Does it intrude on your privacy?
Twitter has been known for its 140-character limit. but it announced that it is extending the character limit to 280. Was this the right move? Let’s find out.
CCleaner was hacked and malware was included in their software update. How can you protect yourself when such a popular software gets hacked and malware gets into your system?
A new feature uncovered in Facebook is the ability to “snooze” or temporarily unfollow a friend. This feature might actually prove useful in the long term. Let’s find out more about it.
Usenet has been used for a very long time, and now it has come back with a vengeance. Find out what Usenet is, how it works, and how it can benefit you.
While we’re intensely focused on the positive aspect of self-driving vehicles, we often forget to look at the downsides that might come up along the way.
A new technology in Windows 10 can track your eye movements and allow you to navigate the PC. Is this eye tracking feature really useful or just a gimmick? Let’s find out.
The standard thought is that you need to always use the official charger to charge your phone or else it will damage your battery. How true is this? Let’s find out.
For those who are hesitant to do shopping online out of safety concerns, here are some ways to minimize the risks involved when making online transactions.
A new CIA leak has revealed that it can now infect air-gapped systems at will using a couple of cunning tactics and a USB thumb drive. Here’s how it works.
You may have heard of DDos, or even encountered one before, and are looking for ways to counter it. Here’s how DDoS protection works and how you can counter it.
Intel has released the Intel Core i9 that boasts a whopping 18 cores. Why would a PC need that many cores, and why did Intel come up with this processor?
With the WannaCry ransomware making the headlines, many people are wondering if Wanncry is able to infect Linux. The answer is yes, only if you allow it to.
Given that almost everything you do is being tracked, it’s normal to have privacy concerns. Here’re some ways you can minimize the amount of data apps collect from you.
With the release of the biometric debit card by MasterCard, the questions being asked are whether fingerprints are more secure than PIN numbers and if the technology is mature. Let’s find out the answers.
Blackberry won in an arbitration case against Qualcomm and has now $815 million in its pocket. This could lead the company to do a couple of great things.
After a long while, Ubuntu is looking to abandon Unity in favor of the Gnome desktop for Ubuntu 18.04. What does this mean, and what’s its impact to its users? Let’s find out.
Verizon and Comcast have both announced the launch of prepaid Internet broadband packages. This might actually help invigorate innovation in the United States’ Internet market.
U.S. Congress has repealed the FCC Internet Privacy Regulations to allow ISPs to sell customer data to advertisers. Should we enter panic mode without first examining the facts?
It’s been discovered that a bug in Lastpass browser extensions is leaking passwords. Here is what you need to know about the exploits and what you can do to protect yourself.
You probably know and have heard about “zero-day exploits,” but there are some ugly truths that you would rather not know as you get deeper into it. Here are some of them.