Ancestry.com has been in the business of personal genetic-tracking for a while – allowing many consumers to discover their ancestry for an approximated cost of $100. And while some consumers may be eager to find out about their ancestry background, most of them are scared of discovering certain genomes that are disturbing. However, most sceptical […]Read More
One of the most important tasks a web developer may have is creating a secure user account system. Your users need to know that their passwords will be protected and not hacked. However, as hackers never sleep and are constantly finding new ways to exploit weaknesses in your system, you need to find a good […]Read More
Imagine this situation. You are getting ready to board your plane when the flight attendant stops you at the entrance and says, “I’m sorry sir, but we can’t allow you to board this flight, your social credit score is not high enough”. Wait, say that again. If this sounds dystopian to you, that’s because it […]Read More
If you’re using a computer (and if you are reading this article, there’s a high chance that you do), you probably have a favorite operating system that you are willing to defend (hopefully just verbally) against users of other operating systems that say theirs is the best. It’s an old age debate as to which […]Read More
When Donald Trump announced that he will run for president of the United States a lot of people didn’t give him much chance. Sure, he was well known, but mostly as a somewhat controversial business magnate, not as a politician. Then, when he won the election on November 8, 2016 and was formally elected by […]Read More
Unless you really like to gamble, you are using some kind of malware or antivirus program to protect your system. But if the CIA really wants in, they’ll get in. And you won’t even know about it. WikiLeaks reveals in the Vault 7 documents a series of standards that the US Central Intelligence Agency uses […]Read More
Last year, WikiLeaks released 8,761 CIA documents containing interesting details about the technology, malware, viruses and other exploits and zero day vulnerabilities that the Central Intelligence Agency (CIA) is using. One interesting section of this document, titled Vault 7, details how the CIA is using the United States consulate in Frankfurt, Germany as a covert […]Read More
Are you being careful about what you say when you talk with someone on your iPhone or Android device? Or even when you watch something on your Smart TV with your family in the living room? Well, it turns out you should be. According to leaked CIA documents, which we now have insight into thanks […]Read More
Breaking news: the CIA and NSA are spying on people! Well, okay, we already knew that, but at least they’re doing this to protect US citizens and are working for the government. Sometimes though, they get carried away and do things on their own, completely ignoring the orders of the US president in the process. […]Read More
Have you ever thought, “My computer has a mind of his own!” or said these words while working on it, “I didn’t tell him to do that!” If that’s the case (and I know from personal experience it’s true for me), then you probably won’t like to hear about what is hiding in your Intel’s […]Read More