by Master User | Mar 26, 2016 | Blog
File this one away under things not to do. Not that you’d ever have a need to do this, but whatever you do, do not set your iPhone’s date to January 1, 1970. If you do, you stand a good chance of turning your cherished smartphone into a very expensive paperweight....
by Master User | Mar 25, 2016 | Blog
The short answer to the question posed by this article’s title is yes. Yes, your smart TV is listening to your personal conversations. It’s simply a part of the way the technology works. If you spend the money to buy a smart TV, then you’re going to want to use its...
by Master User | Mar 24, 2016 | Blog
Is nothing safe from the hacking community? It seems as though everything is under assault these days. Antivirus and malware blocking software is struggling to keep pace. When those security holes get plugged, the hackers simply shift gears and switch tactics, going...
by Master User | Mar 23, 2016 | Blog
MasterCard has been experimenting with a new facial biometrics app, and is poised to roll it out in force later this year. The basic idea behind the technology is that it will employ facial recognition in the place of traditional passwords, on the thinking that while...
by Master User | Mar 22, 2016 | Blog
The magnetic stripes on the backs of credit and debit cards are problematic. The root of the problem is that they contain absolutely nothing in the way of security. The information they contain is completely unprotected and vulnerable to a type of attack known as...
by Master User | Mar 21, 2016 | Blog
Have you secured your Wi-Fi connection yet? If not, your neighbors may be “borrowing” your internet connection. That poses some potential dangers to you, and could even set you up for some legal trouble, but how can you tell? There are a number of indirect indicators...