|Thursday, June 21, 2018
You are here: Home » Technology

Technology

Facebook admitted that they were performing psychological experiments on users. You may not be on social media yourself, but chances are your friends and family are. Some of us are on there for work purposes … Full article

Perhaps the single most successful lie told by authorities worldwide is that people must be under continuous surveillance to remain safe. This excuse comes second to none, not even convenience, …

Facebook wants and has more information from you than your friends’ list or your geolocation. The controversy that is revolving around Facebook does not stop, at least not completely. …

Some of the most disgraceful crimes in history continue to be perpetrated by out-of-control forces. Although spying on someone’s private conversations may not be classified as a crime against …

The key that opened to door for Facebook is apparently, dopamine. To get people to stay on Facebook for a long time, you have to generate dopamine discharges. These …

Internet crime, cyberwar and cyberespionage are some of the most popular terms in the tech world. The boogeyman of the 20th century was so-called Islamic Terrorism. In the 21st century, … Full article

Facebook excuses its censorship on a plea to “end disinformation” and “sensationalism” on the internet. It will not be enough to have a large audience or be registered as …

SÃO PAULO – Facial recognition technology comes loaded with comfort, yes, promises of greater security, okay. But it also comes loaded with a major, yet often ignored inconvenience: Violation …

Social media personalities generated more than $4 billion in one year for large social media pyramid scam users. A pyramid scheme or as I prefer to call it, pyramid …

La conectividad y los avances tecnológicos no tienen que ser arriesgados. Está en las manos de los consumidores el exigir que su privacidad y seguridad sean protegidas. Imagine un …

A previous article explained Google’s transformation from search engine to online censor. Changes in its search algorithm makes it harder to access what it calls fake news, low-quality information …

So…some people actually want to be microchipped like a dog. They’re lining up for it. They’re having parties to get it done. It if isn’t available to them, they’re …

In case you don’t have enough to worry about with hackers getting into our power grids, cyber attacks taking down entire countries, and epic natural disasters, a newly discovered …

Were Hurricanes Harvey and Irma natural or engineered? It’s unclear. Geoengineering makes the latter possible. So-called High Frequency Active Auroral Research Program (HAARP technology) manipulates the atmosphere, climate, and …

We’ve all seen it before. Magic vaccines that prevent disease, magic pharmaceuticals that promise to treat and cure those who are ill, magic diet pills that will make you …

Sometimes you have to think that scientists don’t ever read science fiction, and thus have not even contemplated all the things that could go wrong when they do something …

Facebook, Google and Twitter use the name Net Neutrality to push for a tighter, more monopolised Internet while claiming they seek  to protect an open environment. Dozens of technology …

The Petya Ransomware attack hit globally, but one country, in particular, was devastated by it. The Ukrainian infrastructure was brought own by the attack, where the epicenter occurred, and now, …

Remember that Eternal Blue loophole created by the NSA? Well, it has been employed again in the launch of the Petya Ransomware Cyberattack. Thanks, NSA. The attack began earlier …

It is becoming more common for parents to share pictures of their children – sharenting – since they are babies. Many do it innocently but experts warn of future …

The use of quantum computers could spell the end of privacy and security. Everything a computer does today is based on a series of zeros and ones. These two …

There is no such thing as cyber security. The only choice is more security or less security, as the recent hack of the National Security Agency demonstrates. Hackers stole …

The losers will be those who work to live, those who simply go to work every day to carry out tasks that do not satisfy them at all. Three …

A group of hackers has revealed espionage tools allegedly used by the US National Security Agency. According to documents made available by Shadow Brokers, the organization of hackers that …

5G is being rolled out fast right now, with Verizon testing it out in 11 US cities and ATT also conducting experiments. For those who don’t know, 5G is the latest …