Don’t use USB sticks you find
Here is a scenario for you: You are walking around, catching Pokémon,…
Cloning chip-and-PIN cards: Brazilian job
Recently, the United States shifted from using insecure magnetic stripe in credit…
Top 5 most notorious cyberattacks
Most cyberattacks are fairly mundane. In the worst cases, the user sees…
What is sextortion, and how can we protect ourselves and our children?
Blackmail is a crime as old as time, and modern technology has…
Surface Studio 2: tech specs, pricing, details
The Surface Studio 2 is the same amazing all-in-one desktop as the…
Don’t plug in random USB sticks
I am not sure about you, but [sarcasm on] my ABSOLUTE FAVORITE…
Xbox One S available starting August 2nd, Microsoft confirms
Mark your calendar, Microsoft has just confirmed that the new slimmer Xbox…
IT Digest: Windows 10 Redstone 2, KB3194496 issues, Help & How To
This week on Pureinfotech: Microsoft rolled out another test version of Windows…
Security Week 36: jailbreak theft, farewell to RC4 and holes in routers
Our lives will be smooth once PCs are embedded into our brains.…