Anyone who has used a computer in the last decade is more than likely to be familiar with Windows XP. It has been the most popular operating system (OS) for just shy of 13 years, and for good reason. It was quickly adopted because of its user friendly interface and reliability, and has a very loyal…
These days, you can track just about anything in your life with the right device: how you move, sleep, drive, and even how you eat. But how much data do we really need, and at what point does this information cause more harm than benefit? Here are a few tools you can use to track…
On Monday, Google announced that that they will expedite the removal of a satellite image of a boy who was killed in Richmond, California near Hensley Street.Kevin Barrera, 14, was the victim of a homicide and was found slain near the railroad tracks in Richmond California on August 15, 2009. You can view a satellite image of…
We’ve all seen robots in movies and are amazed at how they have “Artificial Intelligence” to think for themselves. Robots in the real world require programming in order to perform actions.
Take the Roomba, the automated vacuum cleaner, which will sweep up dust and debris on your floor, carpet and any other hard floor surface.…
With the technology industry constantly attempting to bring to market the newest gadgets and gear, form factors are taking on a science fiction flair. Wearable devices such as eye glasses, watches and even flexible LCD displays are the tech gear we will come to depend on over the next decade. How we integrate these devices…
Steve Gibson from Security Now! and ShieldsUP! has created a new method of authentication. It is Secure QR Login or SQRL for short. Steve has created a smart phone app that will allow you to create a certificate for authentication and replace your password. You would use this app to authenticate with any website that you use…
Facebook is a very popular social networking site, over 1 Billion users around the world use it. As with any online activity you are vulnerable to all types of attacks such as social engineering and phishing attacks to obtain your information. Thankfully Facebook and other social networking sites have improved their security features to prevent…
If you’ve logged into a secure website before, there's no doubt that you've encountered CAPTCHA. It’s the security feature that distorts words and numbers in an effort to thwart non-human users from accessing that site. Consider it a ‘prove you’re human’ test, and it just might be a lot less secure. Enter software company Vicarious,…
Google the search engine giant has had a lot of requests to exclude and "piracy sites" from the results. Google has been hit with over 30 million requests to take down URL's that contain copyrighted content from British Recorded Music Industry (BPI). Google denies many of these requests because BPI is mostly Spamming Google to…
If you're still rocking Windows XP, we admire your dedication and ability to squeeze over a decade of use out of an operating system you presumably purchased long ago (nobody pirates XP, right?), but the end is nigh if you care at all about security. Come April 2014, Microsoft will cease supporting the legacy OS, thereby leaving your system…
We've all suffered this inconvenience at least a dozen times in life; door locked, hands full and now the dreaded contortionist movements to retrieve your keys and manage to slide it in the lock. It’s a problem that has plagued the developed world, but alas no more.Enter the Kwikset Kevo. The dead-bolt door lock that…
IT has been great at coming up with new ways to protect your entire network from any external source gaining access to your data. This is definitely a great and necessary layer of defense to have in place. This has been the go to method in securing networks since we have had them. The issue is that not all attacks come…