Posted on July 9th, 2019
Do not adjust your screen. The logo above is displayed upside down as a comment on Zoom.
Zoom Video Communications (NASDAQ ZM) is a provider of video conferencing and IP phone services. Zoom Meeting Client apps have found their way onto Macs and ...
Posted on May 8th, 2019
Today a Tech Friend asked:
I am in the process of organizing my passwords. I would like to put them in an app and have heard of KEEPER. It has a template and seems very easy to use. It does cost $30/per year. Is there an app similar to this on...
Posted on April 24th, 2019
Facebook disclosed in its quarterly financial results that it estimated a one-time loss of $3 billion to $5 billion in connection with an "ongoing inquiry" with the F.T.C.
Credit Andrew Harnik/Associated Press
By Mike Isaac
April 24, 2019
Posted on March 27th, 2019
Brian X. Chen, The New York Times, March 27, 2019
There are many tools for setting up two-factor authentication, a security mechanism that prevents improper access. These four methods are the most compelling.
Credit Glenn Harvey
When Facebook r...
Posted on February 22nd, 2019
Nick Bastone, Business Insider Feb. 19, 2019, 9:04 PMNest GuardIn early February, Google announced that its home security and alarm system Nest Secure would be getting an update. Users, the company said, could now enable its virtual-assistant tech...
Posted on February 12th, 2019
Win McNamee/Getty Images
Rob Price, Business Insider, Feb. 10, 2019, 9:00 PM
Former Facebook exec Alex Stamos says the leadership culture at the company is like "Game of Thrones."In an interview with CNN, the outspo...
Posted on February 6th, 2019
Editor’s note: After the 2017 Equifax data breach QTIPS recommended that users avoid using the credit bureau’s TrustedID Premier service. Reasons were explained in this QTIPS blog post from October 2017.
That QTIPS post also highlighted instruct...
Posted on February 5th, 2019
A "Never-Ever" is something no one should ever do. "Never Evers" are those sometimes unwritten rules about things that matter most to us; love, family, work, and computing.
Topping my list of computing "Never-Evers" is this: never, ever fall for...
Posted on January 30th, 2019
This article from Business Insider is from original reporting by Jonathan Stempel, Reuters, Jan. 29, 2019Marissa Mayer was CEO of Yahoo from 2012 to 2017. Ethan Miller/Getty A U.S. judge rejected Yahoo's proposed settlement with millions of people...
Posted on January 9th, 2019
Watch out for phony PDF reader apps.
Even mainstay free Adobe Reader can be compromised by cybercriminals and posted to sketchy software download sites visited by the unwary.
Myriad off-brand free PDF reader apps are often malicious schemes to ...
Posted on January 5th, 2019
(and What’s Overhyped)
Brian X. Chen, The New York Times, January 4, 2019
A.I. that responds to your voice. Next-generation wireless networks. If this year’s biggest consumer technology trends have a familiar ring, there’s a reason for that.
Posted on November 27th, 2018
A malvertising campaign deployed via a high-profile ad platform targeted iOS users across the US. Crooks hijacked over 300 million web sessions.
By Catalin Cimpanu for Zero Day
November 27, 2018 -- 00:05 GMT (16:05 PST)
Posted on November 23rd, 2018
Is Facebook your friend? Are you OK with how Facebook uses data about you that it collects? Was Facebook’s motto "move fast and break things" ever a great idea?
Billions of users here and around the world really like Facebook. They can have fanta...
Posted on May 28th, 2018
An analysis by Cisco’s threat intelligence division found that hundreds of thousands of routers, from a range of manufacturers, were infected by the malware linked to the hacking group Fancy Bear. Credit Ozier Muhammad/The New York Times
By Louis ...
Posted on May 17th, 2018
It’s no surprise that risks abound online. However, you may be surprised that security researchers point to computer user behavior as the #1 risk factor. It’s true, cyber attacks occur mostly as a result of users’ innocent (or careless) mistakes a...
Posted on March 8th, 2018
Data backup is more complex than ever for computer users as we ponder how to protect our data in local, virtual, and cloud storage environments. To meet this challenge all computer users need a realistic data protection plan so that at least one c...
Posted on February 27th, 2018
Credit Doug Chayka
By Farhad Manjoo
Feb. 27, 2018
Something strange, scary and sublime is happening to cameras, and it’s going to complicate everything you knew about pictures. Cameras are getting brains.
Until the past few years, just about all c...
Posted on January 31st, 2018
Google has cracked down on Chrome extension malware—but the bad guys are finding ways to stay ahead of their defenses.
Lily Hay Newman, January 30, 2018
You already know to be wary of third-party Android apps, and even to watch yo...
Posted on January 30th, 2018
Posted on January 16th, 2018
Experience knows that when the air bags deploy it’s already too late.
You're street smart. While driving 70 mph on a crowded highway you notice a sticky pattern forming in traffic ahead. With barely a thought you drop back a few car lengths. Car...
Posted on January 15th, 2018
By J. D. Biersdorfer
Jan. 15, 2018
Q. Is it safe to install the Windows patch for these new Spectre and Meltdown bugs? Do they affect Linux? (And who names these security flaws, anyway?)
A. Meltdown and Spectre, the two recently announced securit...
Posted on January 14th, 2018
By Mike Matthews, iMore
14 Jan 2018
It happened again last week.
A friend was telling me she had convinced her mother to get a Mac laptop.
"But what is this MacSweeper?" she said, with a hint of puzzlement in her voice.
She meant, of course, MacK...
Posted on January 10th, 2018
Warning!! Don't click the big green button. The button will download dangerous malware in the guise of a must-have media player app.
oops. You clicked it. It was irresistible, wasn’t it?
After the secret thrill of downloading the app, the excit...
Posted on December 15th, 2017
Q: Are VPN operators to be trusted?
A: My opinion is that VPN operators are at best a little shady. After all, they’re offering anonymity to anyone.
What do you really know about the scads of free and paid VPN operators promoting themselves onl...
Posted on November 8th, 2017
Our readers are a savvy bunch who aren't likely to be taken in by an online scam—but we've all got those friends and relatives we worry about. Here's our definitive guide to helping them stay safe online.
Photo from Futurama.
When training your lo...