How to keep smartphone-using kids safe – Educating children about the appropriate and inappropriate uses of smartphones begins by assessing the level of responsibility the child can handle and tweaking the phone accordingly.
50 Best Websites 2012 – TIME’s annual salute to sites and services which can keep you entertained and informed, save you time and money — and maybe even change your life.
10 Online Security Tips for Gen Y – According to our research, only 31% of Gen Y ranked security as the most important consideration when making decisions about their computer. In fact, Gen Y was more likely to prioritize entertainment and community than security. This is in spite of the fact that at least half indicated that they had computer security issues in the past two years. In reality, being proactive with personal online security doesn’t have to be an inconvenience and should be a priority for this connected generation. Here are ten ways to get started.
5 free open source alternatives to Microsoft Office – Small businesses don’t always need Microsoft Office software for word processing, spreadsheets, email, database and publishing tools.
How to Buy an Internal Hard Drive – Every desktop PC needs a hard drive or SSD–and many need more than one. If you’re looking to expand your computer’s storage capacity, keep these tips in mind.
New Social Network Launches for Women With Breast Cancer – A new website called MyBreastCancerTeam aims to make it easier for breast cancer patients to connect with others who know exactly what they’re going through.
The first 10 things you should do to a new Windows 8 desktop installation – This list is specifically for Windows 8 installations on desktops or notebook computers with no touch interfaces.
Political Differences in Computer Security: ZoneAlarm Infographic – This may be the first time you have ever seen politics and computer security mentioned in the same sentence, but what you may not realize is that individuals with different political viewpoints approach personal security differently. Here’s what this year’s voters have to say.
How to see inside businesses using Google Maps – A new feature inside Google Maps lets users peek inside businesses before visiting them, thanks to panoramic photos shared by the businesses with Google.
Internet Archive Launches TV News Search Database – The Internet Archive launches a new database that allows anyone to search for television news broadcasts.
Bromium secures computers by holding apps in isolation – New security software separates apps and their processes from the operating system to keep attacks at bay.
Microsoft points to security tool to plug IE vulnerability – Windows users are asked to download free security software following the recent discovery of a zero-day vulnerability in Internet Explorer. The free security tool, called the Enhanced Mitigation Experience Toolkit (EMET), will prevent hackers from gaining access to Windows-based systems and is currently available on Microsoft Web site.
Internet Explorer Zero-Day Flaw Exploited by Same Java Gang – Attackers are exploiting a new security vulnerability in Internet Explorer and security experts are recommending users stop using IE until the flaw is patched.
Bogus “Windows Email Security Update” emails lead to phishing – Hot on the heels of the malicious spam emails posing as Microsoft notifications about changes to Microsoft Services Agreement comes a Microsoft-themed phishing attempt. By clicking on the offered link, the users are taken to a bogus website that asks them to choose their email service and login. Of course, any of the submitted credentials will end up in the phishers’ hands, and the users will be redirected to a genuine Microsoft support page. Users are advised to remember that Microsoft (or any other legitimate company, for that matter) would never include login links in their emails.
Two men plead guilty to hacking hundreds of Subway POS computers – At the plea hearings on Monday, federal prosecutors noted that the conspiracies involved more than 146,000 compromised cards and more than $10 million in losses.
Phishers continue to target legitimate websites – Attackers confidently exploit legitimate websites with the same methods and that they succeed because victims are not implementing recommended best practices, countermeasures and responses, according to the APWG.
Virgin Mobile login leaves customers open to hacks – Virgin Mobile USA customers are vulnerable to hackers, says one user who says he’s been unable to get the company to take the issue seriously.
QuickBooks Online Crosses Borders, Goes Worldwide – Intuit opens up its popular cloud-based accounting software to more countries – pretty much the whole world, in fact.
iPhone now as secure as BlackBerry, say tech chiefs – IT leaders and industry experts believe that Apple now roughly matches RIM on mobile security, removing BlackBerry’s last remaining advantage over the iPhone in enterprise.
GreenSQL 2.2 Provides Complete Security for Microsoft SQL Server 2012 and SQL Azure – GreenSQL, the database security company, now ensures complete database security for SQL 2012 (“Denali”) and SQL Azure with GreenSQL 2.2. GreenSQL 2.2 has enhanced performance and added significant business continuity features. The high availability, multi-level fault tolerance, and bypass options ensure clients’ databases are always readily available.
Analysts see trouble on the horizon for Netlfix – Netflix saw its stock price slide almost 6% yesterday after the publication of a rather pessimistic report published by analysts at Macquarie Securities.
Google brings new ‘e-mail via text message’ service to Africa – The Web giant is introducing a new service to millions of cell phone users in Africa, which lets people send and receive e-mails through SMS messages.
Yahoo Closes $7.6 Billion Deal with Alibaba Group – Yahoo will live up to its promise to pay its shareholders most of the money from a $7.6 billion deal with the Chinese Internet company Alibaba Group.
Smishing – Short for SMS Phishing, smishing is a variant of phishing email scams that instead utilizes Short Message Service (SMS) systems to send bogus text messages. Also written as SMiShing, SMS phishing made recent headlines when a vulnerability in the iPhone’s SMS text messaging system was discovered that made smishing on the mobile device possible. Smishing scams frequently seek to direct the text message recipient to visit a website or call a phone number, at which point the person being scammed is enticed to provide sensitive information such as credit card details or passwords. Smishing websites are also known to attempt to infect the person’s computer with malware.
Off Topic (Sort of):
For avian watcher, tweets truly are for the birds – Ever wonder what those birds that wake you up are really trying to say? British bird expert Bill Oddie heads to the zoo to translate chirps into tweets (the Twitter kind).
Newly-discovered gospel mentions Jesus’ wife – New evidence has emerged that Jesus was married – or, at any rate, that some early Christians thought he was.
Questions you should never ask in an interview – When an interviewer asks if you have any questions, that is not the time to see what you can get from a company.
Smartphones: Look Who’s Leading Now! – Europeans used to laugh at how far behind Americans were in mobile phone technology. Oh how things have changed.
Germany proposes ban on surveillance software exports to totalitarian regimes – Germany’s foreign minister Guido Westerwelle has told a conference that the country hopes to ban the export of tools that could allow repressive regimes to monitor their own citizens.
When it comes to cybersecurity law, where do we draw the line on information sharing? – Information sharing in law enforcement and national security is essential, but in a democracy, so is privacy. The challenge is how we balance those two factors.
“Television is more interesting than people. If it were not, we would have people standing in the corners of our rooms.”
– Alan Corenk
Today’s Free Downloads:
FrostWire 5.4.0 – FrostWire is a peer-to-peer file sharing program for the Gnutella and BitTorrent protocols. FrostWire is written in Java, and is a fork of LimeWire, another popular Gnutella client.
WinGuard Pro – Secure your computer by password protecting your Windows applications, programs and EXE files. Plus, protect your data with encryption for your files, folders and drives – directly from Windows Explorer.