Charging Your Smartphone… What Can Possibly Go Wrong?
Modern smartphones consume so much energy that charging them once a day is not always enough. When they are used intensively, the user sometimes has to look for a power
569 articles
Modern smartphones consume so much energy that charging them once a day is not always enough. When they are used intensively, the user sometimes has to look for a power
Adobe’s suite of software offerings is one of the most popular programs in the world — which is precisely why it is also one of the most targeted and exploited
Are you reading the truth or a pack of lies on social networks? Learn to tell the difference with this quick guide. From the poor mutts in dog homes that
Sure, it sounds like a great idea to check into your favorite bar or coffee shop on Facebook, Foursquare, Yelp, or any number of applications that let you make similar
It’s that time of year again: when you put away your winter clothes, realize you haven’t gone to the gym nearly enough to be ready for swimsuit season — and
The goal of most attackers, regardless of how they go about their business, is to steal user data. That could be in small, discrete attacks on individual users or it
If a website is compromised by a careful, talented, and well-funded attacker, then the scary reality is that no one will probably ever know that the site had been hacked
We all want the newest and best of everything. That’s why every time the latest device comes out we rush to upgrade our suddenly outdated version. Less than 6 percent
Everyone should know by now that there are, sadly, no members of deposed African royal families who want to share millions of dollars with you, no strings attached. What everyone
With the increasing importance of online life, each of us faces the need to use more and more web services: social networks, e-mail, online banking and so on. Each service
Attackers trying to infect your computer with malware capable of remote access don’t necessarily seek money; some cybercriminals are just having fun. The most valuable items to these invaders are
WordPress has become one of the more popular web platforms, both for personal and professional websites, because it is simple to use and yet very flexible. But this popularity also
Facebook recently announced the return of facial recognition for photos, and as tends to happen whenever the company announces new features for its site, privacy advocates are wary of this
Today’s teens live in a world in which much of their lives — scholastic, social and otherwise — take place online. This puts parents in the difficult position of wanting
Pop-up ads aren’t the massive problem they once were, but they’re still a nuisance. And because most reputable sites now steer clear of them, a lot of the pop-ups that
The official Day of Love has arrived, so many of us will receive traditional anonymous Valentines – most of them in electronic form nowadays. Usually it doesn’t take a genius
Massive multiplayer online games — MMOGs — have become hugely popular in recent years, which means, unsurprisingly, that they’ve become big targets for attackers. These games create alternative universes, often
Aside from the endless hours we spend on Gchat at work, online chatting is mostly a kid’s game. But the responsibility falls on adults to know the basics of safe
These now-familiar square images you see in ads, magazines and posters have proved to be the easiest and cheapest way to link the real and the virtual worlds. All you
At the start of each year, many people make resolutions to better themselves, but for many of them those efforts have dissipated by the time February rolls around. Well, the
Hardly a month seems to pass that Facebook doesn’t scare the wits out of privacy advocates, and Mark Zuckerberg’s social networking behemoth may have just created its biggest flap yet