Category Archives: TechWorm

Playing for Money in the New ‘Prospectors’ Game

Playing for Money in the New ‘Prospectors’ Game If the title caught you by surprise, you’re not alone. ‘Playing for money’ sounds like an oxymoron. Imagine this: you get hired by a company for a new job. On your first

What is a ping?

How does internet ping work Ping is a type of network packet that is used to check if a machine that you want to connect to over the internet is available or not. A ping is a network packet termed

Effectively Manage Your Android Data with Coolmuster Android Assistant

Effectively Manage Your Android Data with Coolmuster Android Assistant Applications and files are eating up your Android phone storage space? Transferring data from your phone to computer takes you too much time? Finding a specific file costs you 30 minutes

New malware uses Microsoft’s PowerPoint as an attack vector to infect computers

Microsoft PowerPoint exploit used to spread malware and evade antivirus Cybercriminals leave no opportunities to exploit when presented with security loopholes. According to a report from Trend Micro, a security firm, cybercriminals are abusing a vulnerability in the Windows Object

HBO’s Facebook and Twitter accounts hacked in latest cyber security breach

HBO hacking saga continues: Company’s social media accounts hacked HBO, the popular entertainment network, suffered a major blow on Wednesday night when a notorious a hacking group broke into the company’s Twitter and Facebook accounts. “Hi, OurMine are here, we

‘Ice Lake’ will be the successor to Intel’s 8th-gen Core processors

The 9th generation of Core processors will run on 10nm+ process technology Intel is gearing up to release its 8th generation of Core processors, known as “Coffee Lake” later this month, which is also based on 14-nanometer (nm) process technology.

Do anti-virus companies create viruses to sell their products ?

Do antivirus companies create computer viruses? This has surely been a question every one of us has thought about at some point. The theory that an anti-virus company would perpetuate their own virus and then come come up with a

The History of Smartphone Security and How to Stay Protected

The History of Smartphone Security and How to Stay Protected The world was forever changed in 2000 when the Ericsson R380 model hit the market and laid claim to the title “first smartphone.” Though Motorola and Nokia had manufactured cell

How DRM Can Strengthen Content Security

How companies can use Digital Rights Management (DRM) Tool to strengthen their content security When your organization starts generating data, the onus is on you to maintain the confidentiality of such information. It is here that content protection and security

Is Snaappy the App That’s Ushering In A New Age of Communication?

Is Snaappy the App That’s Ushering In A New Age of Communication? Snaappy, the newest communication platform on the block, is using AR to let users express their emotions, and it’s much more than your typical messaging app What exactly