Federated learning is a new approach for training the algorithms we use every day. But what actually is federated learning and is it really more private? We explain everything you should know about this new algorithm model.
Will Google Stadia and other cloud-based video game streaming services put an end to video game piracy? These new services have gaming pirates talking, but a complete disruption in the piracy market may still be years away.
Ultrasonic tracking is used in various applications on mobile and other devices, sometimes without the user’s knowledge. Find out more about how to block ultrasonic tracking and what it means for your privacy.
Scholarship scams take advantage of students looking to help fund their education. We reveal how to spot and avoid common scholarship scams, as well as what to do if you've been caught out by one.
The personal information of hundreds of thousands on CenturyLink customers, including name, addresses, email addresses, and phone numbers was exposed online.
From sending fake invoices to manipulating employees into wiring them money, hackers have a wide range of business email compromise techniques that they use to defraud companies.
Remote wiping your laptop or PC, coupled with full disk encryption, is the best way to protect your data if a computer is lost or stolen. This article explains the advantages of both and how to do them.
A new study shows most secondhand hard drives often contain private and sensitive information from their previous owners. We explain the findings of the study as well as explain why your old data might still be accessible.