March 2, 2018

5G’s secret weapon will be low latency, empowering next-gen VR and gaming

ANALYSIS: As the 2018 Mobile World Congress wound down this week, next-generation 5G wireless technology was clearly the show’s biggest story, promising dramatically faster data speeds. But 5G’s secret weapon will actually be ultra-low latency, a concept that’s easily understood, but hard to market. Verizon, Vodafone, and Huawei have spent the last month demonstrating how […]
February 28, 2018

Come see The Vergecast Live at SXSW on March 9th!

Will you be in Austin on March 9th? Because South by Southwest will be starting right around then, we’ll be taping a live episode of The Vergecast, and, hey, you should come and be part of our audience. Nilay, Dieter, Ashley, and Casey will go onstage and crack jokes about technology and also probably brand […]
February 26, 2018

USPS Finally Starts Notifying You by Mail If Someone is Scanning Your Snail Mail Online

The USPS recently told this publication that beginning Feb. 16 it started alerting all households by mail whenever anyone signs up to receive these scanned notifications of mail delivered to that address. The notification program, dubbed “Informed Delivery,” includes a scan of the front and back of each envelope or package destined for a specific […]
February 23, 2018

Cyber News Rundown: Linux OS Hacked onto Nintendo Switch

The Cyber News Rundown brings you the latest happenings in cybersecurity news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst and a guy with a passion for all things security. Any questions? Just ask. Hackers Run Linux OS On Nintendo Switch When gaming consoles get hacked, it’s usually by someone who […]
February 22, 2018

Defend Your Business – Don’t Get the Ransom Letter

Ransomware is a serious threat to small businesses, taking information, devices, and networks hostage. It is the most common form of malware and falls into two categories of malicious programs: encryptors and lockers. Encryption ransomware programs convert your files into a cypher or code, preventing you from accessing them. The hacker demands payment to decrypt […]