A Vox article shows you how to better understand the Internet via forty maps. Some of the information is truly stunning, like who has the world’s best overall broadband speeds. http://www.vox.com/a/internet-maps#list-16
I had a staff member ask me how they could permanently delete/erase a file off an Apple Mac hard drive. I thought it was a good question for a “Tip of the Week”. The below Macworld article talks about two built in Mac utilities that you can use to permanently delete/erase a file off a […]
Apple’s “Find My iPhone” feature has been very helpful in law enforcement tracking down stolen Apple iPhones, Apple iPads and Mac laptops. In fact, the New York City Police Department highly recommends the use of “Find My iPhone”. But some iPhone victims are using “Find My iPhone” to take the law into their own hands […]
It turns out the recent major Adobe account breach not only affected Adobe account passwords, but also gave the hackers access to user’s email addresses and other information. Thus, the hackers had information necessary to access bank accounts, accounts on social media sites, including Facebook and even garage door openers. Update – Facebook went so […]
Apple’s new iOS7 includes an “Activation Lock”. If a user has “Find My IPhone” activated on their device, it requires an Apple ID username and password to turn off “Find My IPhone”, before a person can reactivate or erase the iOS device. “Activation Lock” makes it much more difficult for thieves to steal iPads or […]
Reblogged from MakeUseOf. Article by James Bruce. We all have things we’d rather not tell the world about — whether that be a flagrant disregard for copyright law, a penchant for specialist videos, or a desire to simply stay out of Big Brother’s ever-probing eye. Whatever the reason, I think it’s about time we clear […]
Brendan O’ Connor, a University of Wisconsin Law Student, built a $57 Wi-Fi Spying tool using a Raspberry PI computer and Wi-Fi adapters. His results using the homemade built spying tool are astonishing and scary. O’Connor is also an IT security researcher having previously worked for DARPA, Verisign and Sun Microsystems. He is presenting his […]
This week’s Tip of the Week is a two part tip of the week. 1) The first tip of the week is about web site passwords that you no longer want stored on your web browser. This New York Times GadgetWise blog post tells you how to delete web site passwords for each of the […]
This New York Times article discusses recent cyberattacks on American Express, J.P. Morgan Chase and other financial institutions where the attacks look to destroy financial data.
Researchers have found that twenty five countries are using surveillance software, often for means besides monitoring criminals. Many of the countries are countries known for human rights violations as well as limiting free speech.