BVA

Category: Content
Type: Blog Article

Generated 2 months ago

New blog articles detected

  • Do this and not that – Mobile Malware

    The three best practices to avoid mobile malware is to use an official app store, resist temptation to jailbreak your device, and keep updates current. Apple and Google app stores remain the most vigilant about mobile malware concerns. Google uses Verify Apps that runs in the background of modern Android systems to scan for spyware, […] The post Do this and not that – Mobile Malware appeared first...

  • Cisco PIX firewall and IOS software security vulnerabilities

    Cisco has released reports that a high priority security hole in its IOS software could have allowed hackers access to memory contents, and therefore confidential information, from more than one product in their lineup. Cisco has pinpointed cause of the vulnerability to  “insufficient condition checks in the part of the code that handles [Internet Key […] The post Cisco PIX firewall and IOS softwa...

  • Teenage hacker grabs massive data from 800,000 open FTP servers

    Not all teenagers are sneaking out in the middle of the night, one is sneaking into nearly 800,000 open FTP servers. The story begins with a security researcher, Minxomat, scanning IPv4 addresses to find nearly a million open FTP servers needing no authentication for access. This scan revealed that not only is no authentication needed but […] The post Teenage hacker grabs massive data from 800,000...

  • Take Back Privacy with Windows 10

    Windows 10 offers an option to help protect third parties from tracking your movements based on your connections to Wi-Fi networks. Under Settings > Network & Internet > Wi-Fi, turn on the Use random hardware addresses setting. This will keep third parties from matching your Wi-Fi adapter’s hardware address with your personal information, and therefore […] The post Take Back Privacy with Windows 1...

  • Top 3 Identity Management Solution Recommendations

     Identity-Management-as-a-Service (IDaaS) provider aids with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established identity. Okta Identity Management Okta comes highly rated for identity management, and for good reason. Rated best-in-class for...

  • Keep Conversations Private with End-to-End Encryption Messaging

    Messaging is one technological advance that most cannot live without. But most of us would like to rest assured that what we type will be for the eyes of the receiver only, and not a mysterious third party. Regardless of paranoia or worry about hacking, encryption is a sure fire way to protect messages as […] The post Keep Conversations Private with End-to-End Encryption Messaging appeared first o...

  • iOS 10 Wants to Help you Get More Beauty Rest

    You’ll find the new bedtime feature offered in iOS 10 in the Clock application. The first time you use the feature you will be walked through the functions. You may notice the application is now in dark mode, finally realizing most of us set alarms when we are already in bed or near sleep. Begin […] The post iOS 10 Wants to Help you Get More Beauty Rest appeared first on .

  • Turn Voicemail into Text with iOS 10

      Apple has always had a productive approach to voicemail, first with the visual listing of voicemails with the contact name, date and time attached, making it easy to browse past or go directly to the voicemail you would like to hear. The upgrade to iOS 10 takes this a little further, allowing for voicemail transcription, […] The post Turn Voicemail into Text with iOS 10 appeared first on .

  • Turn off read receipts for specific conversations in iOS 10

    I have my read receipts on and I love the transparency. In a world where we are always accessible, I hope that my read receipts provide my friends and coworkers reassurance that I am not simply ignoring their messages but rather I am not on my phone (which happens!!). I’d like to think this also […] The post Turn off read receipts for specific conversations in iOS 10 appeared first on .

  • Samsung Galaxy Note 7 – no longer voluntary

    Great news for Samsung users that have been using their Note 7 with extreme caution the last few weeks, replacements will be in stores Wednesday, September 21st! The recall transitioned from voluntary to mandatory as the US government’s Consumer Product Safety Commission (CPSC) issued a deathknell due to the lithium-ion battery overheating. According to the […] The post Samsung Galaxy Note 7 – no ...

BVA

Category: Content
Type: Blog Article

Generated 2 months ago

New blog articles detected

  • Galaxy Note 7 is FIRE. Literally.

    Due to the growing number of Galaxy Note 7 explosions, the FAA has put some restrictions in place for those that still dare carry the Note 7 around. Virgin Australia, Qantas, and Jetstart have banned passengers from charging their Galaxy Note 7 in flight. A proactive move for the airlines, as the Australian aviation authorities […] The post Galaxy Note 7 is FIRE. Literally. appeared first on .

BVA

Category: Content
Type: Blog Article

Generated 3 months ago

Shall we increase our level of intimacy?

41,034,204 ideas and insights to help you find what’s next.

Log in Sign up

Shall we increase our level of intimacy?

41,034,204 ideas and insights to help you find what’s next

Create Free Account

Already a user?  Log in