If you’ve used Apple Pay before, you already have a good idea of how the Apple Credit Card works, since it’s just a card optimized for use with iPhones.
USB Power Delivery is designed to be a single charging standard that provides a safe and efficient way to push the limits of voltage and current to devices.
A VPN is currently the best way to protect your device from hacking, DNS/IP address leaks and ISP surveillance. Learn what a VPN is and how it can protect you.
Modern video compression algorithms aren’t the same as the image compression algorithms you might be familiar with. Here’s how video compression works.
You’ve probably noticed that many flagship phones nowadays come with a time-of-flight camera. But what is a time-of-flight camera, and how does it work?
While the inner mechanisms of cryptocurrency are complex, buying and using it is actually very easy. Here is how you can buy bitcoin and start using it.
Serverless computing is a new trend that allows developers to host their apps and websites without having to run or maintain a server. Find out how it works here.
Different codecs, like Dobly Atmos and DTS:X, have different surround-sound capabilities and support different types of hardware used in higher-end home theater systems.
The accelerometer is the component in your phone that detects if you are holding it upright or sideways. Find out how an accelerometer works in a smartphone.
You may have come across the term “ping,” but what is a “ping” really? What does it mean in the computing world, and why does it have such an odd name?
From analog to digital, there are quite a few audio formats that are still in use today. Should you use Digital (S/PDIF), HDMI or just plain analog? Let’s check it out.
Technology products are designed to have a short lifespan, whether you like it or not. There is some rationale behind them, though a little outrage over planned obsolescence is certainly justified.
The news is packed with reports of huge data breaches, and they never seem to cease. This is a quick look at how data breaches work and why it is impossible to eradicate them.
Robotic process automation and artificial intelligence are starting to take over ever-increasing levels of knowledge work. Check out their differences and how they affect you.
Did you recently access the Internet on a commercial flight and wonder how you are able to connect to the Web at such a high altitude? Here’s how airplane Wi-Fi works.
Ethical hackers are people who hack for a good cause. These people use their hacking skills to uncover security flaws of a website/app. Find out how ethical hacking works.
What happens if viruses change their “signatures” to avoid detection by antiviruses software? This is what polymorphic and metamorphic malware are about.
While bone conduction technology’s been around for a while, headphones based on it are starting to take off. Learn what bone conduction tech is and where it’s being used.
Predictive analytics analyzes data to figure out what might happen in the future. How does predictive analytics really work, and how reliable are its forecasts?
We know that Google and Amazon have algorithms that give us updates, search results, and product recommendations, but what does that actually mean? What qualifies as an algorithm?
While Wi-Fi 6 brings faster speed to your wireless devices, there is another Wi-Fi standard, WiGig, that is even faster. Find out what WiGig is and its limitations.
The dopamine that we get from video games and the techniques we’ve devised to get that dopamine lie at the root of both good and addictive game design.
There are many different image file formats, and it can be confusing. Check out the differences between these image file formats and learn which one to use.
Many websites and apps come with dark pattern interfaces to confuse and trick their users. Find out what “dark patterns” are and how they are used to trick people.
You might be surprised to learn that different mobile network operators are sharing the same infrastructure. This is known as a piggybacking mobile network. Find out more about it here.
Data: companies want it, users have it, and it’s valuable. But it’s not often clear what user data consists of, where it goes, and how it’s profitable.
Have you wondered why you can’t access popular services like Facebook or WhatsApp in China? This is because of the great firewall of China. Learn more about it here.
A banking trojan disguises itself as a genuine app so as to access your banking details. Learn all about banking trojans and how to keep yourself safe.
Most of the new phones and computers you buy come with pre-installed software in them. This bloatware can be annoying at best and storage hogs at worst. But what can you do about it?
Blockchains and cryptocurrencies are parts of a cryptographically administrated and secured system. Despite being used as interchangeable terms, they’re not the same thing.
Code injection is an attack perpetrated by an attacker’s ability to inject and execute malicious code into an application. Here’s how code injection works in detail.
SIM hijacking has been around for a while, and its becoming a lot more popular for hackers to steal phone numbers and use them to gain access to accounts.
Nvidia revealed their newest lineup of graphics cards which include ray tracing. What exactly is ray tracing, and why is it so important to the future of gaming?
There are many apps that filter out blue light so you can sleep better at night. How can blue light hurt you? Do blue light filtering apps really work? Let’s find out.
Weaponized information is anything that is intentionally falsified and meant to influence opinions or perceptions of truth. Learn how to defend against it.
If you look at your router’s model number, you will always see a term like “AC 1200,” “AC 1900,” etc. So what does this router AC rating mean? Let’s find out.