21 Ways to Buff Up Your Browser – You probably spend more time working (and playing) in IE, Chrome, Firefox, or Safari than in any other application. Here are our favorite tips, tricks, and add-ons to supercharge your Web browser.
Get a Siri-like interface on Android with Vlingo Virtual Assistant – Even though Vlingo isn’t a sexy name, it does have a pleasant feminine voice that reads back your incoming texts and email, as well the ability to take your spoken input and achieve plenty of results.
7 Essential Apps for the Small Business IT Professional – Small business IT professionals need the capability to respond to issues from anywhere and at a moment’s notice. Fortunately, mobile apps for both the Android and iOS platforms let you manage computer and network issues from your smartphone or tablet. Here are a seven of our favorite free apps
Microsoft India Warns Hackers May Have Compromised Customer Financial Data – Microsoft has warned customers that their financial data such as credit card information may have been compromised by hackers who attacked the company’s online store in India earlier this month.
Oops! Selena and Bieber’s hidden camera bedroom video Facebook scam – Selena Gomez and Justin Bieber in a sex video? Your Facebook friends may be sharing the link with you – but take a reality check, it’s another survey scam.
Online dating services: Risking more than a broken heart – People looking for companionship are trusting online services more than ever. Is that trust misplaced? Michael Kassner looks for the privacy and security gaps in online dating.
Multimedia: A Linux Achilles’ heel – Jack Wallen takes on one of the problems with Linux as a desktop environment — multimedia. His most recent experiences collide with his past to conclude the Linux desktop does have an Achilles’ heel.
How You’re Breaking the Law Every Day (and What You Can Do About It) – You share music, rip DVDs, make Hitler whine about your first world problems, and much more in the course of your regular online activities—and more often than not, you do these things without giving a thought to the fact that you’re actually breaking the law. Here’s a look at how you’re inevitably circumventing copyright law and what you can do to protect yourself.
Facebook, Flickr, others accused of reading text messages – Reports surfacing this weekend claim that popular smartphone applications can access users’ text messages amongst other personal data, even when that phone is not being used.
Firms embrace Do Not Track for targeted ads only – Privacy advocates say consumers are expecting more from a Do Not Track policy than marketers are willing to give. What Do Not Track means to you and what it means to companies that are collecting your data crumbs across the Internet are likely two very different things.
0-day risk analysis service by Qualys – Qualys launched Zero-Day Risk Analyzer, a new service to help companies protect their IT systems against zero-day attacks which is delivered as part of the QualysGuard Cloud Platform and it includes Verisign’s iDefense zero-day vulnerabilities and global threats.
OnForce Teams with Apple to Offer Small Business IT Support – Through novel partnership with Apple, OnForce retools its service model to shepherd small business customers through their IT configurations.
IBM Expands QRadar to Deliver Security Intelligence – Big Blue integrates its Q1 Labs acquisition to provide deeper threat intelligence and security insight.
Telefonica Plans Q2 Launch for Virtualized Phones – Telefonica expects to start selling virtualized Samsung Galaxy S II phones with VMware technology in Spain, starting in the second quarter.
Apache Traffic Server – Apache Traffic Server is an open source extensible HTTP/1.1 compliant caching proxy server. Apache Traffic Server boasts caching capabilities that can improve response time while reducing server load and bandwidth needs by caching and reusing frequently requested web pages, images, and web service calls. It also offers “proxying” (see proxy server) to add keep-alive, filter or anonymize content requests, or add load balancing by adding a proxy layer.
Off Topic (Sort of):
Advocacy Group Takes Aim at Anti-Porn Bill – One of the advocacy groups that worked to stall the controversial Stop Online Piracy Act in the U.S. Congress has taken aim at a bill that would require U.S. ISPs to retain the Internet Protocol logs of all their customers for a year, in the name of fighting online child pornography.
Personal data encryption, IT and the Fifth Amendment – Last week, a federal court for the first time ruled that the Fifth Amendment of the U.S. Constitution — the right to not self-incriminate — protects against “forced decryption.”
The true state of cloud security – Alert Logic released its first State of Cloud Security Report, a semi-annual quantitative analysis comparing real world security incidents observed in hosted and cloud environments with those observed in traditional on-premise environments. Counter to the conventional wisdom that infrastructure in service provider managed cloud environments is inherently less secure, the analysis found these environments tend to face a lower level of risk than on-premise environments.
U-2 spy plane keeps on soaring (photos) – The Pentagon, smitten with the Global Hawk drone, had been ready to ground the U-2 fleet for good. But the latest Air Force budget proposal tells a different tale.
“Success is really about being ready for the good opportunities that come before you. It’s not to have a detailed plan of everything that you’re going to do. You can’t plan innovation or inspiration, but you can be ready for it, and when you see it, you can jump on it.”
- Eric Schmidt
Today’s Free Downloads:
Partition Assistant 4.0 – Partition Assistant is a comprehensive disk partition solution, which includes a Partition Manager and Extend Partition Wizard for Windows 7/XP/2000/Vista and Server 2008/2003/2000.
CurrPorts 2.00 – CurrPorts displays the list of all currently opened TCP/IP and UDP ports on your local computer. For each port in the list, information about the process that opened the port is also displayed, including the process name, full path of the process and more.