Can Google hide information about Hillary Clinton?
The current presidential candidate for the Republican Party, Donald Trump, recently claimed that Facebook, Google, and Twitter are intentionally withholding content about the FBI's criminal investigation...
How to protect your personal information from ISPs
Washington — The Federal Communications Commission (FCC) announced new Consumer Privacy Policies on October 27, 2016. The FCC explained that if ISPs wanted to use...
Lenovo Vibe Shot review: A budget phone for photo-addicts
The Lenovo VIBE Shot focuses on camera performance over any other feature bringing professional photography performance into the smartphone world. The phone includes an array of...
Lenovo’s Vibe K5 set to compete with high-end smartphones
Released in April, Lenovo aims its Lenovo Vibe K5 will compete with mid-end and even higher-end rivals. Its relatively low price should help Lenovo’s...
Lenovo and Motorola to unveil the new Motorola Moto M next...
Reportedly, Lenovo and Motorola will unveil the new Motorola Moto M during an event in Guangzhou, China, next month. Several leaks have depicted and...
Alcaltel Idol 4 and 4S review: 2 phones worth considering
U.S. – Phone maker Alcatel released two budget-range smartphones on September that are worth checking out. The Idol 4 and Idol 4S are handsets...
Dyn DDoS attack was the result of manufacturers’ negligence
Manufacturers of Internet of Things (IoT) devices are at fault for the Dyn DDoS attack. They have put on the market devices designed to...
Developers react to Jordan Belamire’s VR groping story
A player in the VR game QuiVr reported an incident of sexual harassment last week. Days later, the developers of the game responded with...
Watch the leaked photos of the upcoming Nook Tablet 7
Barnes & Noble has a new Nook in the works. The American book retailer filed regulatory documents to the FCC earlier this week showing...
Hackers tricked John Podesta with a phishing email scam
On Sunday, the news giant CNN learned hackers might have gained access to John Podesta’s emails by using a simple phishing attack. Cyber security...