Impact

Powered by TechAbout

1700 Stories

TECHi Impact examines how technology reshapes markets, regulation, and society. From antitrust battles and AI policy to tariff wars and geopolitical tech conflicts — Impact covers the forces that move stock prices and change industries overnight. The intersection of technology, power, and consequence.

Zombie warning broadcast over hacked TV station emergency alert system

Zombie warning broadcast over hacked TV station emergency alert system

If you hacked into the emergency alert system for a local television channel, what would you tell your part of...

In lieu of a Bible, iPad app used to swear in promoted Atlantic City firefighters

In lieu of a Bible, iPad app used to swear in promoted Atlantic City firefighters

There was a time when not having a Bible at when firefighters or other public officials were sworn in would...

Duh. The easiest way to stop hackers is with real passwords

Duh. The easiest way to stop hackers is with real passwords

One of the most personal online violations that can occur to anyone is getting hacked. It could be a personal...

The absolutely terrifying potential ramifications of the energy department hack

The absolutely terrifying potential ramifications of the energy department hack

There are four primary ways that a malevolent entity, whether it be terrorists or a foreign state, could go about...

Broad range of presidential authority over cybersecurity is actually quite reasonable

Broad range of presidential authority over cybersecurity is actually quite reasonable

When a headline such as "Broad Powers Seen for Obama in Cyberstrikes" appears on the NY Times, my initial response...

Rash of iPhone thefts have earned the culprits a name: the Apple Pickers Gang

Rash of iPhone thefts have earned the culprits a name: the Apple Pickers Gang

They may not have the high-end panache of the Wet Bandits from Home Alone, but after forty attacks on pedestrians...

5 ways to work smarter on your smartphone

5 ways to work smarter on your smartphone

In many ways, smartphones are actually too smart. They have capabilities that few ever take advantage of and there are...

Is Google in cahoots with the government to hide the depths of privacy infringement?

Is Google in cahoots with the government to hide the depths of privacy infringement?

Put your tin foil hats on. It's conspiracy theory time. Since 2010, Google has been tracking and releasing their bi-yearly...

Silicon Valley is buying protection from DC through skyrocketing lobbying spends

Silicon Valley is buying protection from DC through skyrocketing lobbying spends

The greatest threat to startups is lack of momentum. For companies that make it over the startup hump, it's competition....

With socialism failing in France, they look to internet tax to balance their load

With socialism failing in France, they look to internet tax to balance their load

The French were not able to maintain their 75% tax on the super rich, so now they're aiming for the...

Mark Zuckerberg on privacy

Mark Zuckerberg on privacy

Facebook graph search has the potential to be a great thing for Facebook and its users. Perhaps more importantly, this...

Fashionable hoodie blocks drone surveillance

Fashionable hoodie blocks drone surveillance

As military and domestic surveillance technology continues to advance, many fear a "Big Brother" society that is emerging around us....

7 apps every business should consider

7 apps every business should consider

As smartphones and tablets have unstoppably consolidated their vice-like grip on everyday life, no business would want to be left...

The 10 Most Notorious Hackers

The 10 Most Notorious Hackers

When we think of the term hacker, we are reminded of men in dark hoods, who hack into your systems,...

Dear Congress: End warrantless email monitoring immediately

Dear Congress: End warrantless email monitoring immediately

We were so close. A non-controversial bill,  the Video Privacy Protection Act, flew through the Senate and was sent to...

Global cyberwarfare is civilization’s greatest threat

Global cyberwarfare is civilization’s greatest threat

The depths to which cyberwarfare has grown is one of the most controlled and guarded secrets in most of the...

App security: how important is it?

App security: how important is it?

If you consider the amount of attempts to hack into government systems and databases, and how many times your personal...

How to boost your wifi connection with a beer can

How to boost your wifi connection with a beer can

Whether you're working hard or hardly working, the Internet is needed for a lot of what you do—from researching for...

The biggest privacy and censorship threat since the dawn of the digital age is upon us

The biggest privacy and censorship threat since the dawn of the digital age is upon us

To those without the technological expertise to fully understand what this all means, it could seem as a harmless measure...

Security cameras from across the globe restore faith in humanity

Security cameras from across the globe restore faith in humanity

Today is Thanksgiving in the United States of America, a day in which we count our blessings, break bread with...