French privacy watchdog orders Google to expand 'right to be forgotten' glob
Google started delisting search results through the "right to be forgotten" ruling enacted in the EU last year, but the search giant limited the removal of results to its domains in Europe. French privacy watchdog CNIL (National Commission on Informatics and Liberty) is now ordering Google to remove the results from all instances of the search engine, irrespective o...
Security
French privacy watchdog orders Google to expand 'right to be forgotten' globGoogle started delisting search results through the "right to be forgotten" ruling enacted in the EU last year, but the search giant limited the removal of results to its domains in Europe. French privacy watchdog CNIL (National Commission on Informatics and Liberty) is now ordering Google to remove the results from all instances of the search engine, irrespective o...SecurityJune 15, 2015, 1:41:4French privacy watchdog orders Google to expand 'right to be forgotten' globsource: http://www.androidcentral.com/french-privacy-watchdog-orders-google-expand-right-be-forgotten-globally | June 15, 2015, 1:41:4
Share on Tumblr
Smartphone thefts drop as kill switch usage grows
Phone theft used to be a growth industry. The snatch-and-run stealing of iPhones even had its own clever moniker: Apple picking. But such thefts might be in decline. Last year, 2.1 million Americans had phones stolen, according to a nationally representative survey conducted by the Consumer Reports National Research Center. (Another 3.1 million smartphones were lost.) In 2013, abou...
Security
Smartphone thefts drop as kill switch usage growsPhone theft used to be a growth industry. The snatch-and-run stealing of iPhones even had its own clever moniker: Apple picking. But such thefts might be in decline. Last year, 2.1 million Americans had phones stolen, according to a nationally representative survey conducted by the Consumer Reports National Research Center. (Another 3.1 million smartphones were lost.) In 2013, abou...SecurityJune 14, 2015, 21:17:28Smartphone thefts drop as kill switch usage growssource: https://www.yahoo.com/tech/s/smartphone-thefts-drop-kill-switch-161500257.html | June 14, 2015, 21:17:28
Share on Tumblr
Amazon has finally released its first transparency report
Amazon released its first transparency report today, making it the last major tech company in the Fortune 500 to publicly disclose the number of government data requests it has received, ZDNet reports....
Security
Amazon has finally released its first transparency reportAmazon released its first transparency report today, making it the last major tech company in the Fortune 500 to publicly disclose the number of government data requests it has received, ZDNet reports....SecurityJune 14, 2015, 1:0:28Amazon has finally released its first transparency reportsource: http://www.theverge.com/2015/6/12/8774857/amazon-transparency-report-2015 | June 14, 2015, 1:0:28
Share on Tumblr
How To Keep Your Kids Safe On A Smartphone [Infographic]
Smartphones and tablets get a bad rap when it comes to child usage. If you have ever seen a child glued to their iPad at dinnertime instead of touching their food, it’s easy to understand why. But here on Hongkiat.com, we view these devices as tools that help us improve our lives, even keep our kids safe, and that we are , and should always be in control....
Security
How To Keep Your Kids Safe On A Smartphone [Infographic]Smartphones and tablets get a bad rap when it comes to child usage. If you have ever seen a child glued to their iPad at dinnertime instead of touching their food, it’s easy to understand why. But here on Hongkiat.com, we view these devices as tools that help us improve our lives, even keep our kids safe, and that we are , and should always be in control....SecurityJune 9, 2015, 21:10:22How To Keep Your Kids Safe On A Smartphone [Infographic]source: http://www.hongkiat.com/blog/protect-children-smartphones-tablets/ | June 9, 2015, 21:10:22
Share on Tumblr
Snapchat makes logging in more secure with two-factor authentication
Snapchat's making it a bit easier to keep your account (and all the snaps contained within) secure. The app's most recent update on Android and iOS adds the ability to enable two-factor authentication. Once switched on inside the settings menu, login verification requires that you enter a 6-digit code upon signing in from any device you haven't used before. ...
Security
Snapchat makes logging in more secure with two-factor authenticationSnapchat's making it a bit easier to keep your account (and all the snaps contained within) secure. The app's most recent update on Android and iOS adds the ability to enable two-factor authentication. Once switched on inside the settings menu, login verification requires that you enter a 6-digit code upon signing in from any device you haven't used before. ...SecurityJune 9, 2015, 20:40:6Snapchat makes logging in more secure with two-factor authenticationsource: http://www.theverge.com/2015/6/9/8754435/snapchat-adds-two-factor-authentication | June 9, 2015, 20:40:6
Share on Tumblr
Three CAPTCHA Tips That Block Spam Bots Without Annoying Your Users
As Andrew Stein, our Chief Scientist, discussed in his post Are We Still Using CAPTCHAs to Stop Form Spam?, we’ve come to a point where the only people who have trouble reading basic CAPTCHAs are your actual users – not the spam bots....
Security
Three CAPTCHA Tips That Block Spam Bots Without Annoying Your UsersAs Andrew Stein, our Chief Scientist, discussed in his post Are We Still Using CAPTCHAs to Stop Form Spam?, we’ve come to a point where the only people who have trouble reading basic CAPTCHAs are your actual users – not the spam bots....SecurityJune 8, 2015, 20:19:37Three CAPTCHA Tips That Block Spam Bots Without Annoying Your Userssource: http://resources.distilnetworks.com/h/i/53821918-three-captcha-tips-that-block-spam-bots-without-annoying-your-users/181642?v=8&_z1_caid=17922&utm_medium=content&utm_source=_Zemanta_4173b88f15 | June 8, 2015, 20:19:37
Share on Tumblr June 4, 2015, 2:21:17Keylogger Scanner to Remove Keyloggers
Keylogger Scanner to Remove Keyloggers
Nowadays both business and home computer users need to be aware of how to protect themselves from attack by computer viruses, spyware, malware, and fraudulent attempts to steal personal identi -
Security
Share on Tumblr
How the Tech Behind Bitcoin Could Stop the Next Snowden
THE NATIONAL SECURITY Agency knows Edward Snowden disclosed many of its innermost secrets when he revealed how aggressive its surveillance tactics are. What it doesn’t know is just how much ...
Security
How the Tech Behind Bitcoin Could Stop the Next SnowdenTHE NATIONAL SECURITY Agency knows Edward Snowden disclosed many of its innermost secrets when he revealed how aggressive its surveillance tactics are. What it doesn’t know is just how much ...SecurityJune 4, 2015, 2:17:11How the Tech Behind Bitcoin Could Stop the Next Snowdensource: http://www.wired.com/2015/06/tech-behind-bitcoin-stop-next-snowden/ | June 4, 2015, 2:17:11
Share on Tumblr
How to make Facebook send you encrypted notification emails
Learn how to add an OpenPGP public key to your Facebook profile and set it so that Facebook will encrypt the notification emails it sends to you....
Security
How to make Facebook send you encrypted notification emailsLearn how to add an OpenPGP public key to your Facebook profile and set it so that Facebook will encrypt the notification emails it sends to you....SecurityJune 4, 2015, 2:11:44How to make Facebook send you encrypted notification emailssource: http://www.cnet.com/how-to/how-to-make-facebook-send-you-encrypted-notification-emails/ | June 4, 2015, 2:11:44
Share on Tumblr
Senate passes NSA surveillance reform bill
The Senate has passed the USA Freedom Act, which would resurrect a more restrained version of government surveillance powers. The USA Freedom Act was created to rein in Section 215 of the Patr...
Security
Senate passes NSA surveillance reform billThe Senate has passed the USA Freedom Act, which would resurrect a more restrained version of government surveillance powers. The USA Freedom Act was created to rein in Section 215 of the Patr...SecurityJune 3, 2015, 0:30:6Senate passes NSA surveillance reform billsource: http://www.theverge.com/2015/6/2/8714651/senate-passes-usa-freedom-act-nsa | June 3, 2015, 0:30:6
Share on Tumblr June 3, 2015, 0:16:37Everything you need to know about firewalls
Everything you need to know about firewalls
Did you know that when your computer is connected to the internet, it has over 131,000 �ports� that a hacker could connect to? These ports are like doors in a building and if they aren�t -
Security
Share on Tumblr
With one false tweet, computer-based hack crash led to real panic
A false tweet from a hacked account owned by the Associated Press demonstrates the need to better understand how social media data is linked to decision making in the private and public sector...
Security
With one false tweet, computer-based hack crash led to real panicA false tweet from a hacked account owned by the Associated Press demonstrates the need to better understand how social media data is linked to decision making in the private and public sector...SecurityMay 27, 2015, 2:42:1With one false tweet, computer-based hack crash led to real panicsource: http://www.sciencedaily.com/releases/2015/05/150520160141.htm | May 27, 2015, 2:42:1
Share on Tumblr
Shocker: Americans Don’t Think Their Data Can Stay Private
This weekend the big news was that the Senate failed to follow the House’s lead to pass a bill reforming NSA surveillance. Instead, they squabbled at the absolute last minute until the early...
Security
Shocker: Americans Don’t Think Their Data Can Stay PrivateThis weekend the big news was that the Senate failed to follow the House’s lead to pass a bill reforming NSA surveillance. Instead, they squabbled at the absolute last minute until the early...SecurityMay 25, 2015, 22:38:16Shocker: Americans Don’t Think Their Data Can Stay Privatesource: http://www.wired.com/2015/05/security-roundup-may-24/ | May 25, 2015, 22:38:16
Share on Tumblr May 25, 2015, 22:29:10How to Remove a Computer Virus?
How to Remove a Computer Virus?
If you have used a computer long enough, then you have probably had a virus infect your computer at some point. You know how annoying and potentially dangerous they can be to your PC and you w -
Security
Share on Tumblr