News

Screen hacking: What is it, and how will you know if you’ve been hacked?

Screen hacking is a contactless attack during which hackers take remote control of your touchscreen. How can you know if your touchscreen has been hacked? Can attackers take control of your screen to access your passwords, apps, and files – and how can you prevent it? Read on to find out. Contents What is screen […]


What is identity theft and best ways to protect yourself

Identity theft is a growing problem in the internet age. Many specialized identity theft solutions are available to consumers – but is finding the right identity theft protection solution the best way to protect yourself? Or can you prevent identity theft without paying for a specialized service? Read on to find out. Contents What is […]


Taking control of test execution: customizing the executor

Test execution is the process of running tests to verify a specific functionality in a system. It’s a great way for us to find bugs in our applications, but over time we realized that we needed to improve the speed and efficiency of our test execution method. Here’s how we did it. The story so […]


How to set up a VPN on Linux in 3 easy ways

Even a secure operating system like Linux can take advantage of the benefits provided by a virtual private network (VPN), so it’s a good idea to set up a VPN on your Linux device. But why do you need a VPN on Linux, and how do you install it? Let’s find out. Contents Why do […]


Why is Iran shutting down the internet?

Iran is in turmoil. As mass protests sweep the Middle Eastern nation, the Islamic Republic government is suppressing internet access. In response, Western authorities are taking the unusual step of easing sanctions against the regime. What’s going on in Iran? What’s going on? Civil unrest is spreading across Iran. Protests broke out after the death […]