Google the search engine giant has had a lot of requests to exclude and "piracy sites" from the results. Google has been hit with over 30 million requests to take down URL's that contain copyrighted content from British Recorded Music Industry (BPI). Google denies many of these requests because BPI is mostly Spamming Google to…
If you're still rocking Windows XP, we admire your dedication and ability to squeeze over a decade of use out of an operating system you presumably purchased long ago (nobody pirates XP, right?), but the end is nigh if you care at all about security. Come April 2014, Microsoft will cease supporting the legacy OS, thereby leaving your system…
We've all suffered this inconvenience at least a dozen times in life; door locked, hands full and now the dreaded contortionist movements to retrieve your keys and manage to slide it in the lock. It’s a problem that has plagued the developed world, but alas no more.Enter the Kwikset Kevo. The dead-bolt door lock that…
IT has been great at coming up with new ways to protect your entire network from any external source gaining access to your data. This is definitely a great and necessary layer of defense to have in place. This has been the go to method in securing networks since we have had them. The issue is that not all attacks come…
KeePass and similar products like it will help users create strong passwords because it’s built into the program and the user doesn’t need to think about what characters to use and how to use them. The integrated Random Password Generator will allow users to define a specific set of password outputs. Another nice feature is…
Recently Atlanta-based Aaron's Rent-to-Own computer chain has been accused of installing monitoring software onto its computers. The software was able to track a customers' location, took photos using the computers' webcam, and also tracked all keystrokes using a keylogger. Unwary customers private information was sent to Aaron, everything from login credentials from emails to Facebook…
If you've ever tried to drive “up north” in Michigan during any one of the peak seasons (summer, hunting, snowmobile) you've no doubt encountered construction delays. With a constant need to maintain and upgrade, and little to no improvements made in time-to-completion and cutting overall costs, finally someone has challenged the status quo in the…
Windows Firewall can protect your computer from many types of online attacks. Although it may not protect you from getting viruses or malware; it can protect your system from running an application that has not been specifically allowed by you as the user. Some may think that firewalls are a nuisance but it is a…
User Account Controls primary design goal was to help protect a Windows computer, Vista and later, from programs attempting to make a major change. When UAC is active it prompts the user and asks the user if the change is valid. The design goals of UAC have been achieved since by default it is enabled…
Checking for a publisher or developers digital signature is very important from a security standpoint. Downloading a file that has not been verified from a legitimate source may cause issues because the file may need a host to wreak havoc on. Even worse, an unverified program that has been installed can do a number of…
Google stated that they intend on expanding Google Fiber to many more communities. However this is taking more time than they anticipated. There are some major obstacles that have slowed down and prevented Google from expanding its fiber network. Most of the time spent getting access to City resources is dealing with permits.You can get Google's fiber network…
ID Quantique is a small security firm based in Geneva, Switzerland. They specialize in quantum mechanics to boost data security. Their Quantum Key Distribution (QKD) is a method by which a sender transmits a key encoded with photons to a recipient. This is not new technology, this will protect data from hackers and is viewed…