What/Why/How – you should always use a VPN
What is a VPN? A virtual private network creates a secure tunnel between two sites via the Internet to protect your privacy. This is usually a paid service to ensure web browsing is secure and private while using public wifi or less secure wifi networks. What happens? Your PC connects to a VPN server, and […] The post What/Why/How – you should always use a VPN appeared first on .
Coolest MacBook Pro Touch Bar Features
Sitting just above the keys, the Touch Bar displays an array of color changing functionalities. Check out just a few of the cool things the Touch Bar can do! Just like texting on an iPhone, the Touch Bar allows for predictive text. For even faster email responses. You can Preview and Edit your photos with […] The post Coolest MacBook Pro Touch Bar Features appeared first on .
Google Makes Photo Scanning a Piece of Cake!
The holidays seem to give people the little push they need to start digitizing their photos. I hear it every season – “This is the year we are finally going to get all the old photos on the big TV and go through them!” and then it comes time to decide how, and the idea […] The post Google Makes Photo Scanning a Piece of Cake! appeared first on .
Faster Updates Promised for Windows 10 – Creators Update
Microsoft is already promising big things for the Creators Update. Introducing Unified Update Platform (UUP), Microsoft’s answer to user feedback concerning slowness and drained battery life with Windows 10 updates. The UUP process allows for delivery of smaller files and could reduce the size of the update by 35 percent. The differential download packages ensures […] The post Faster Updates Promi...
VR add-on to make Oculus and Vive headsets Wireless
Atlanta based company KwikVR is confident they can deliver a wireless VR headset device that is capable with both the HTC Vive and the Oculus Rift. The device is less than a pound and is attached to your belt. It features two USB ports and an HDMI port. The company reports that the device delivers […] The post VR add-on to make Oculus and Vive headsets Wireless appeared first on .
Luggage Tag Code, Gives Identity and Flight Info to Hackers
Researchers from German security company, Security Research Labs, recently revealed the poor security behind the current travel booking systems. Three of the largest Global Distributed Systems (GDS) handling flight reservations for worldwide travel are Amadeus, Sabre, and Travelport. These three systems handle 90 percent of flight reservations. The poor security stems from these systems originatin...
Say Hello To Intel’s Optane
Hello Optane! First Optane storage announced at CES in the low form of 16 GB and 32GB units to be used as cache, not primarily storage. It is anticipated that Optanes will gradually grow in densities and capacities over the next few years. 3D Xpoint is the technology that bases Optane. Memory cells sit in […] The post Say Hello To Intel’s Optane appeared first on .
Blasted by Phishing Calendar Invitations
Have you been getting random calendar invitations from unfamiliar sources about events you have never heard of before? It seems we are not the only ones. Most of the calendar invitations seem to be coming from email accounts from other countries, promising deals on brand name products such as Ray-Bans. This is just another type […] The post Blasted by Phishing Calendar Invitations appeared first o...
Shopper Safety – Beware of Fake Apps and Wifi Hotspots
Now that holiday shopping is upon us, security researchers are handing out advice on how to protect yourself and your information from cyber hacking. More and more shoppers use their smartphones while they are shopping, to compare prices and deals at other stores or online. Reports by RiskIQ, an enterprise security firm, estimates that 30 […] The post Shopper Safety – Beware of Fake Apps and Wifi ...
Android Trojan rerouters you to Rogue DNS server
New Android Trojan virus reported by Kaspersky Lab, that goes by the name, Switcher. Switcher Trojan infects wifi routers through an infected Android, where an attacker can then reroute other users on the network to malicious sites. This is through brute force attacks against the admin interface of the router – using a predetermined list […] The post Android Trojan rerouters you to Rogue DNS serve...