Quantcast
Channel: ITworld security
Browsing all 147 articles
Browse latest View live

How to protect your Wi-Fi network from snoopers...including Google

A lawsuit against Google for snooping on Wi-Fi networks is moving forward, and it should raise this question for you: Just how safe is your own network against snoopers? If you've got a small wireless...

View Article


What does Acxiom know about you? More than you think, not all of it true

AboutTheData.com lets you peel back the cover of the data mining giant and look inside. You may be surprised what you find there.read more

View Article


Fingerprint scanning + smart kitchen appliance = trouble [CARTOON]

Fingerprint scanning is about to go mainstream; here's one potential upside (or downside)read more

View Article

What to do after your email account is compromised

Here is what I tell people who want to know what to do next, after their email has been opened up and sorted through.read more

View Article

6 must-have free downloads for your network

If you've got a small or medium-sized network and you need to manage it yourself, you're not alone. I've rounded up six great free network tools that make it much easier to handle and troubleshoot your...

View Article


Ironically, using HealthCare.gov may be hazardous to your health [CARTOON]

If you try to access the government’s new health care website, watch out; it’s a little buggyread more

View Article

Tim Cook hits the catwalk [CARTOON]

Former Burberry CEO Angela Ahrendts aims to make Apple even more fashionableread more

View Article

"iPad Air" is the new "low carb" [CARTOON]

If you want to drop some weight, there’s the easy way and there’s the hard wayread more

View Article


The Box.com data debacle part deux: Am I a total idiot, or what?

Some readers say I should have known better than to use a cloud service to store and share files. Here's what I have to say about that. read more

View Article


How your compiler may be compromising application security

Researchers at MIT develop a tool to identify code that your compiler may inadvertently remove, creating vulnerabilitiesread more

View Article

Some houses give out the worst Halloween treats [CARTOON]

Turns out that BlackBerries and circus peanuts have something in commonread more

View Article

Dear Internet bots and sockpuppets: Your days are numbered

BeehiveID analyzes your social media accounts to figure out who's fake and who's real on the Web. read more

View Article

Want to protect your Android phone? Here's how to kill its crapware.

The pre-installed crapware that fills many Android phones is more than just annoying -- it also frequently opens up big security holes. Here's how to kill the crapware and keep your phone safe and in...

View Article


Dick Costolo takes a leap [CARTOON]

Twitter goes public and its executives make a bundleread more

View Article

Type, send, pay: Square Cash is how you should pay your friends and roommates

To say that Square Cash is often more convenient than a check is understatement. Square wants to replace checks in your mind, and is wiling to pay millions in fees to do so. Good for them.read more

View Article


How do I know that you’re lying? Your throat tattoo gave you away

Google wants to patent electronic tattoos that can measure galvanic skin response and talk to your phone. That body ink could also be a lie detector.read more

View Article

Power to the parents? The MiiPC doesn't quite deliver

This low-cost Android-powered PC lets parents control their kids' computer use. The MiiPC is a nice idea, but it's not quite ready for prime time.read more

View Article


Heads are about to roll at Yahoo - literally [CARTOON]

Marissa Mayer’s new employee review system means bad news for some peopleread more

View Article

The Internet of Things is a big deal

Today, the FTC is holding hearings on how smart devices collect data about us and what happens to it. It's time to stand up for our privacy rights now, before it's too late. read more

View Article

Infographic: How major tech companies are encrypting your data

Some are using industry-standard protocols more than othersread more

View Article
Browsing all 147 articles
Browse latest View live