How 2016 became the year of the hack – and what it means for the future

December 21, 2016 By: Geof Wheelwright While new revelations about Russian hacking during the US election continue to make headlines, they were by no means the only big cyber-attacks of the last year. In fact, there were so many that you could dub 2016 as “the year of the hack”. Read More.

Read more

FCC Republicans vow to gut net neutrality rules “as soon as possible”

December 20, 2016 By: Jon Brodkin The US Federal Communications Commission’s two Republican members told ISPs yesterday that they will get to work on gutting net neutrality rules “as soon as possible.” FCC Republicans Ajit Pai and Michael O’Rielly sent a letter to five lobby groups representing wireless carriers and small ISPs; while the letter is mostly about plans to extend…

Read more

Evernote’s New Privacy Policy Allows Its Employees To Access Your ‘Ideas’

December 14, 2016 By: Thomas Fox-Brewster In a startling update to its privacy policy, note-taking app Evernote is allowing a select group of employees to read user content for the sake of improving its machine learning technology. What’s perhaps more startling is that it appears Evernote employees have always been able to access note data, but somehow no one noticed. And…

Read more

Millions in US still living life in Internet slow lane

December 5, 2016 By: Jon Brodkin Millions of Americans still have extremely slow Internet speeds, a new Federal Communications Commission report shows. While the FCC defines broadband as download speeds of 25Mbps, about 47.5 million home or business Internet connections provided speeds below that threshold. Read More. 

Read more

Net neutrality regulations under threat by Trump’s new FCC appointments

November, 22 2016 By: Geof Wheelwright Legislation that assures equal access to high-performance internet – one of the signature achievements of Obama’s administration – could be reversed under President-elect Trump after he appointed two opponents of “net neutrality” to the US communications regulator team. Read More.

Read more

Protecting Your Digital Life in 7 Easy Steps

November 16, 2016 By: Jonah Engel Bromwich There are more reasons than ever to understand how to protect your personal information. Major website hackings seem ever more frequent. Investigators believe that a set of top-secret National Security Agency hacking tools were offered to online bidders this summer. And many of those worried about expanded government surveillance by the N.S.A. and…

Read more

Secret Back Door in Some U.S. Phones Sent Data to China, Analysts Say

November 15, 2016 By: Matt Apuzzo and Michael S. Schmidt   WASHINGTON — For about $50, you can get a smartphone with a high-definition display, fast data service and, according to security contractors, a secret feature: a backdoor that sends all your text messages to China every 72 hours. Security contractors recently discovered preinstalled software in some Android phones that…

Read more

Traveling Tech

Keeping Your Tech Safe While Travelling

The latest Virtuoso Life magazine has some of my recommendations for keeping your information and technology safe while travelling. Have you ever connected to that “Free Internet” wifi at the airport? That free wifi might just end up costing you dearly. Check out the September | October 2014 edition of Virtuoso Life magazine, page 110 for my tips! Update: Macaroni Kid published my…

Read more

Lack of Privacy

Lack of Privacy, Measure of Intelligence?

Reading through story after story about how people are ignoring privacy and security concerns and not changing their mobile behavior. That last story was bold enough to claim: When it comes to security, smartphone users aren’t very smart It’s sad, education isn’t going to help here and it’s independent of intelligence. This is a pervasive problem, people crave functionality… the more you…

Read more

Slack Bot

What’s authentication good for?

The recent news that Slack, a team communication tool, had a breach that leaked email addresses, user names, encrypted passwords and some other stuff is kinda scary. In response, they have activated something called two factor authentication for their users, something that I heavily promote. So, what good does two factor authentication do with hacks and breaches similar to what apparently happened…

Read more