How an Online Petition Exposed BBC Bias

“To achieve impartiality, you do not need to include outright deniers of climate change in BBC coverage, in the same way you would not have someone denying that Manchester United won 2-0 last Saturday. The referee has spoken.” And with this statement, the BBC proved that it was a science denier. Why? Because as far … Continue reading How an Online Petition Exposed BBC Bias

Xhelper: The Android Malware That Can’t be Removed

At some point in your cyber life, you have probably run across malware that seems to persist no matter what you do to remove it. Your antivirus doesn't do the job so you search online for help. Eventually, you may find somewhat daunting virus removal instructions and try to follow them, yet, the next time … Continue reading Xhelper: The Android Malware That Can’t be Removed

Security of VPNs in Question after NordVPN Hack

The recent hack of NordVPN was big news in the tech world, but regular web users, if they heard about it at all, just shrugged it off as, yet, another hack. However, any attack on a major VPN provider needs to be taken seriously. Without a dependable VPN, privacy and security on the web vanishes. … Continue reading Security of VPNs in Question after NordVPN Hack

Computers Poised to Write Chart-Topping Pop Songs

Computers don't care what pop songs humans like. However, they can, given enough data, learn why humans like them. They, or, more precisely, their algorithms, can analyze these popular tunes and find commonalities among them that seem to appeal to members of the human species. This is exactly what one researcher, Dr Mick Grierson, was … Continue reading Computers Poised to Write Chart-Topping Pop Songs

Cybersecurity as a Lip Service: Self-deception in the Corporate Cyber World

According to a report from Verizon, one-third of major cybersecurity breaches were traced to mobile devices. This number is probably lower than it really is because many companies don't release details on how they were hacked. One reason they don't want to give this information is because they are embarrassed to admit how lax their … Continue reading Cybersecurity as a Lip Service: Self-deception in the Corporate Cyber World

5G Networks: Inevitable but Problematic

5G stands for 'Fifth Generation', meaning the 5th generation of mobile technology. No matter what you may hear to the contrary, it will become the new standard. The problem will be getting to that level, because there are, as with all new technologies, problems that must be overcome. For the moment, the positives outbalance the … Continue reading 5G Networks: Inevitable but Problematic