Skip to content Skip to footer

Popcorn in Your Browser

They're calling it "Netflix for Pirated Movies." The website popcorninyourbrowser.net is designed to function like Netflix. Enter in the name of a movie in the search box and the torrent is downloaded for you to watch in their own video player. This new site is trying to capitalize on the popularity of the site Popcorn…

Read More

An Organization’s Security Policy

Most organizations have some sort of high level security policy that addresses different types of information, how that information should be handled, and who should be handling it. To expand, this security policy is essentially a set of rules and practices that control network assets, the information within the network, and how this information is…

Read More

Developers of Photobucket Hack App Arrested

Photobucket Hackers Indicted for Computer Fraud and Access Device Fraud Brandon Bourret and Athanasios Andrianakis, the developers of the app that allowed the harvesting of personal data from Photobucket.com, have been arrested in the United States on charges of computer fraud and access device fraud.Using an obscene pun on the name Photobucket, their cleverly-named app…

Read More

How Drones Can Be Used In The Future

Drones could be the next major tech revolution to sweep the world and these robotic flying machines are now being used for purposes that extend far beyond the secretive realm of the military.Photographers have lofty dreams of using drones to capture stunning aerial views and Amazon founder Jeff Bezos nabbed headlines when he introduced the…

Read More

Google Acquires Timeful

Stressed out? Not enough time in the day? Well, time to relax. Google has welcomed the app Timeful into its stable of productivity apps.Timeful launched last year, focusing on mixing time management, task scheduling, calendar sync and prioritization roles to help the user accomplish their daily tasks without becoming overloaded.Timeful has a very simple and…

Read More

How To Spot A Phishing Email

The subject line of the e-mail referenced "your Amazon Account." The body mentioned my credit card and how it had just been "updated." A quick scan of the rest caused temporary alarm. My credit card? I didn't make any changes to my credit card or my Amazon account. Upon closer inspection, I recognized this e-mail for what it…

Read More

Choosing An AntiVirus Solution

There are a lot of factors to take into account when you’re trying to select the best antivirus solution for your needs. With the security of your data, digital identity and financial transactions at stake, it’s worthwhile investing some time in assessing each antivirus product.Furthermore, if you make extensive use of the Internet, email, messaging…

Read More

Solitaire Back Where It Belongs

Solitaire has returned; Microsoft has listened to the masses. Solitaire players rejoice. Windows 10 will usher in the rebirth of the built-in games. Unlike Windows 8, where you had to download and install the game from the app store, solitaire will once again be preinstalled in the operating system. There is no final decision if…

Read More

Introducing: Amazon Dash

The Amazon Dash button provides yet another clever way to shop. Dash, a stick-on Wi-Fi button, is great for brands, but a loss for consumers as it creates brand-specific shoppers who fail to compare prices.In theory, it sounds great. You stick a Dash button on your Keurig, press it when you're almost out of K-cups, and…

Read More