Skip to content

Author archive:

Josh Turner

Keyboard Maker AI.Type Latest Data Breach

Recently there has been a massive data breach that exposed millions of people. Upon installing the Ai.Type keyboard the application requested full access to your phone which recorded every letter or number you typed. Why would a keyboard and emoji application need to gather the entire data of the user’s phone or tablet? Great question.

Steps You Should Take After a Data Breach

A data breach is a cataclysmic invasion of privacy which can wreak havoc on both businesses and private individuals. 2017 surpassed the total number of data breaches in 2016 by mid-year. Today we touch up on what to do after a data breach.

How to Speed up Your Windows PC

  We all hate slow computers, so this tutorial will show you how to speed up your Windows PC. Disk Cleanup Tool Windows 7 Programs→Accessories→System Tools→Disk Cleanup. Go ahead and tick everything in the disk cleanup window. Wait for the program to finish and click the delete files button. Windows 10 Start menu -> Type […]

The Deep Web vs. The Dark Web

The Deep Web The deep web is commonly known as the invisible web or the hidden web. The deep web is surprisingly large taking up 90% of the internet which is estimated to be 7.5 petabytes which most of that is made up of innocent content such as emails, logins, and subscription websites; generally, anything […]

The Terminology of Malware – What You Need to Know

Computer Virus A computer virus is a malicious software program loaded onto a user’s computer without the user’s knowledge and performs malicious actions. In more technical terms, a computer virus is a type of malicious code or program written to alter the way a computer operates. A virus operates by inserting or attaching itself to a […]