Your IP is:

54.204.90.135

[More Detail]


Instant Port Checker

IP:[get my ip] Port1:[EL2/PR2/PM3] Port2: Port3:

Skip to content

Survey finds generation gaps in adoption of new tech

Wearable tech and Internet-of-Things (IoT) gadgets are all the rage. A new survey from Acquity Group, though, illustrates how different generations are embracing these new developments.

The study defined three age groups: Millennials (ages 18-25), Generation X (ages 26-35), and Baby Boomers (over age 45). (I guess that group between age 36 and 45 just isn’t very interesting). Overall, Acquity Group found that younger consumers are most likely to adopt connected technologies in the long run, but older consumers are more likely to own certain products already.

Categories: General.

Tags: , , , , ,

Prevent identity theft with this interactive site

Preventing identity theft starts with you—making sure you’re aware of the threats out there, and how to avoid them.

Choice Loans, a financial lending service based in the UK, has put together a site that can help. It’s an interactive guide to various types of identity fraud, complete with 16 things you can do to detect or respond to them.

Categories: General.

Tags: , , , , ,

Apple Pay could put an end to data breaches

The retail data-breach epidemic highlighted by Target now has other famous victims, including UPS, Home Depot, and Dairy Queen. If you’ve used a credit card sometime in the past year or two, there’s a very good chance your information has been compromised or exposed by at least one of these data breaches. If you use Apple’s new Apple Pay system, though, such worries just might be behind you.

Categories: General.

Tags: , , ,

The new, more productive iOS 8: Spotlight and Notification upgrades make it well worth downloading

Yesterday Apple unveiled the new iPhone 6 smartphones and the upcoming Apple Watch. The new iPhones will be available soon, but even before they hit the street, the latest version of Apple’s mobile operating system, iOS 8, will roll out. 

Of the many new and updated features in iOS 8, two in particular will help people be more efficient: the new Spotlight search, and Notification Center. Both help you find what you need to find, and do what you need to more simply, and with fewer swipes and taps.

Categories: General.

Tags: , , , , , , ,

Internet Explorer steals the Patch Tuesday spotlight again

It’s hard to imagine that we are already three-fourths of the way through 2014—at least as measured by Microsoft Patch Tuesdays. Today, Microsoft released four new security bulletins, but only one of them is Critical. Guess which one?

Yes. Internet Explorer. Once again Microsoft’s web browser takes center stage as the most crucial of the Patch Tuesday security bulletins. Microsoft resolved a grand total of 42 separate vulnerabilities this month, but 37 of those 42 are addressed in MS14-052—the cumulative update for Internet Explorer. One of the flaws fixed by MS14-052 is publicly known and actively under attack in the wild, which is why this security bulletin is Critical.

Categories: General.

Tags: , , , , , ,

Don’t blame iCloud yet for hacked celebrity nudes

Over the Labor Day weekend, hackers leaked nude images of a number of celebrities including “Hunger Games” star Jennifer Lawrence. The images appear to have been acquired from Apple’s iCloud. So, iCloud is obviously insecure and everyone should stop using it—right?

Let’s just cool our jets. Yes, iCloud appears to have played a role in at least some of the hacked nude celebrity images, but details are still too sketchy to start connecting dots that indict the entire Apple cloud storage service.

Categories: General.

Tags: , , , , ,

The game is not yet over for Gameover Zeus botnet

If you’ve ever watched a horror movie, you know the trope where the hero seemingly kills the monster, but as soon as he turns his back to walk away the monster regains consciousness and attacks again with renewed vigor. According to the latest report from F-Secure, that’s the sort of scenario we might be looking at with the Gameover Zeus botnet.

Categories: General.

Tags: , , , ,

Citrix ShareConnect extends the power of your PC to your tablet

In an ideal world, a tablet would be an extension of the PC—a device that is more portable, yet still enables users to continue work done while on the go. Tablets like the iPad and Samsung Galaxy Tab do work in that capacity to an extent, but not seamlessly. Citrix is changing things, though, with the launch of Citrix ShareConnect, which it calls a remote access innovation that extends the promise of mobile workspaces on any device.

Categories: General.

Tags: , , , ,

Report: Businesses at risk from unreported mobile device theft

Part of a company embracing mobile devices is ensuring tools are in place to remotely wipe sensitive data from a smartphone or tablet if it is lost or stolen. A new study from Kaspersky Lab identifies an obvious and concerning fact, though—those tools offer little value if the missing device isn’t reported.

Kaspersky Lab surveyed nearly 4,000 IT professionals regarding mobile device security concerns. The results illustrate the challenges facing IT managers and an apparent disregard among users for securing mobile devices or protecting business data.

Categories: General.

Tags: , , , , , , ,

5 reasons a small Windows tablet might be in your future

There are a number of smaller Windows tablets hitting the shelves now from Microsoft OEM partners and more on the horizon. At face value it seems like a late attempt by the Windows ecosystem to get in on the mobile device game. The reality, though, is that Microsoft can still capture a respectable—possibly dominant—stake of the tablet market.

Categories: General.

Tags: , , , , ,