Edit Microsoft SkyDrive Docs Without Logging In – Microsoft’s cloud storage and syncing service passes a big milestone, and now allows login-free editing. Not only can collaborators edit the documents individually, but all the user who receive an edit link can edit the document at the same time. The sharer can still, however, require a collaborator to sign in, if a privacy or security concern necessitates that.
Cybersecurity concerns of online dating – According to Fast Company, online dating grew to a staggering $4 billion industry in 2012, making the industry a prime target for cybercriminals. To stay protected, ThreatMetrix has identified five of the top cybersecurity threats for consumers to be aware of when looking for love online:
Parents appalled that school principal is sexy YouTube rapper – A Bronx junior high school principal is reportedly also El Siki, an Internet rapper who, well, parties.
The 20 Best Windows 8 Apps – For the release of Microsoft Surface Pro, we’ve checked out Windows 8 app landscape and singled out the best entries for your approval. You get the new-style apps from the new Windows Store, which automates installation and updating, and gives both users and developers a central place to discover new and needed software.
Big data collection collides with privacy concerns, analysts say – A recent push in the information technology industry to collect and monetize big data is headed for a clash with privacy concerns from Internet users and potential regulation from some governments, according to tech analyst firm Ovum. Internet advertising networks and other companies that depend on the collection of personal data online should prepare for a “rebalancing” of the relationship between themselves and Web users, with Web users having more control of their data, said Mark Little, principal analyst at the U.K. tech and business analysis firm.
Apple tests iWatch with flexible screen – The so-called iWatch would link to the user’s phone or iPad via Bluetooth, and would be controlled either by using the touchscreen or via the Siri voice assistant. It would be a quick and easy way of making voice calls, searches and mobile payments, for example.
Does Netflix encourage binge watching? – Here’s a funny new term that’s probably new to the vernacular: Binge watching. That’s pretty much what we geeks do anyways. Pile up a bunch of our favorite movies and TV shows, and have endless marathons at home.
Almost all US networks can be hacked: Intelligence Committee – The chair of the US House Intelligence Committee has said that hackers from China and Iran are stealing not only military documents via online attacks, but also civilian intellectual property, and that the US government is just watching it happen. (Just another kick at the fear can – of course any network can be hacked – it’s the infrastructure dummy!)
VMWare security hole – it sounds like you need the patch, even if it’s not clear why – It sounds as though guests might be able to tweak their hosts without authorisation, or vice versa, so you probably want to patch now and ask your questions later.
More Java Patches Due Soon – Oracle isn’t done releasing patches for Java SE this month, as another batch will arrive February 19, according to a company blog post.
Symantec: Employees Take Confidential Info and Think It’s OK – According to a new global survey sponsored by Symantec, 40 percent of employees will take confidential information with them when they leave a job. Adding insult to injury, 56 percent of respondents do not see it as a crime to use information taken from their former employers to benefit the competition.
Banking malware is getting sneaker, security firms warn – Financial malware authors are trying to evade new online banking security systems by returning to more traditional phishing-like credential stealing techniques, according to researchers from security firm Trusteer.
Identity theft protection tips – More than 11.6 million adults were victims of identity theft in 2011, according to Javelin Strategy & Research. Child identity theft is also a significant problem, which many people don’t realize. 2.5 percent of U.S. households with children under age 18 have at least one child whose personal information has been compromised by identity criminals. Ten tips for preventing identity theft include:
Microsoft urges international alliances to battle malware – Countries that have signed on to international cybersecurity agreements tend to have fewer malware infections among their citizens, according to new research released by Microsoft and George Washington University.
Tech giants ordered to explain high Australian prices – The Australian government has summoned Apple, Microsoft and Adobe to explain why their products cost more there than in the rest of the world.
Tim Cook reportedly opposed lawsuits against Samsung – Now Apple’s chief executive, Cook was against the lawsuits because of Samsung’s role as a key supplier of components for the iPhone and iPad, Reuters reports.
HP Cracks Down on Student Labor in China – Hewlett-Packard is the latest major consumer electronics company to take a hard look at its overseas suppliers.
Eric Schmidt cashing out 42 percent of his Google stock – The former Google CEO is expected to sell off $2.51 billion of his holdings in the search giant, according to SEC documents.
Bang With Professionals goes out with a whimper – The site that managed to garner more than 70,000 curious people, desperate to find easy love via LinkedIn, has admitted defeat.
Trojan horse – A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. The term comes from the Greek story of the Trojan War, in which the Greeks give a giant wooden horse to their foes, the Trojans, ostensibly as a peace offering. But after the Trojans drag the horse inside their city walls, Greek soldiers sneak out of the horse’s hollow belly and open the city gates, allowing their compatriots to pour in and capture Troy.
Off Topic (Sort of):
I Rob Banks Because That’s Where the Money Is - Dear Quote Investigator: The famous criminal Willie Sutton was once asked why he robbed banks, and his response was simple, eloquent, and humorous. Now I have been told that Sutton never really said this. Instead, it was created by a journalist who was willing to bend the truth to write a more interesting story. Could you explore the genesis of this quotation? (recommended by Michael Fisher).
Damaged Delivery? DropTag Tattles When Your Package Tumbles – DropTag is a tiny, low-power Bluetooth sensor that can be stuffed inside a package before it leaves the warehouse and relay damage data to you in real time.
Glass smartphones will arrive this year, Taiwanese firm says – Sam Yu won’t name the handset makers involved. But the executive at Taiwanese firm Polytron Technologies is confident that consumers this year will see the arrival of partially transparent glass smartphones.
Did Google Earth error send murderer to wrong address? – Dennis and Merna Koula were found dead in 2010. Their son was found guilty of murder. Yet the killing looked like a professional hit. Now some are wondering whether the fact that Google Earth sends searchers for another address to their house might provide the truth.
“We live in a society exquisitely dependent on science and technology, in which hardly anyone knows anything about science and technology.”
- Carl Sagan
Today’s Free Downloads:
SilverSHield 18.104.22.168 – SilverSHielD, a tiny SSH and SFTP server for Windows. It features SSH2 password-based, interactive and public-key authentication methods and fully supports forwarding and sftp subsystem, with state-of-the-art virtual folders management.
NetTraffic 1.19.3 – This free program plots in realtime all data sent and received via all your TCP/IP Network adaptors. Shows separate sent, received, send rate, received rate, peaks and totals.