BLOG
File this one away under things not to do. Not that you’d ever have a need to do this, but whatever you do, do not set your iPhone’s date to January 1, 1970. If you do, you stand a good chance of...
The short answer to the question posed by this article’s title is yes. Yes, your smart TV is listening to your personal conversations. It’s simply a part of the way the technology works. If you spend...
Is nothing safe from the hacking community? It seems as though everything is under assault these days. Antivirus and malware blocking software is struggling to keep pace. When those security holes get...
MasterCard has been experimenting with a new facial biometrics app, and is poised to roll it out in force later this year. The basic idea behind the technology is that it will employ facial...
The magnetic stripes on the backs of credit and debit cards are problematic. The root of the problem is that they contain absolutely nothing in the way of security. The information they contain is...
Have you secured your Wi-Fi connection yet? If not, your neighbors may be “borrowing” your internet connection. That poses some potential dangers to you, and could even set you up for some legal...
Remember last year’s “Heartbleed” scare? If you don’t, or if you need a refresher, Heartbleed was a flaw in the security of SSL, which is the technology employed by just about everyone on the web to...
There are few things that strike terror into small business owners like having someone smear them, their company, or their brand online. Is it any wonder? We’ve all seen and heard horror stories about...
The US Department of Health and Human Services is having a tough time of it. They are the latest government agency to report a significant data breach, but this time, with a twist. In this instance...