You've probably heard that regularly changing your password is an important part of protecting your personal information. Even more critical is choosing a password that is difficult to crack. Intel aims to educate and hopefully inspire users to create safer passwords with their just-announced Password Win contest. 30 first prize winners will receive McAfee All Access 2013 and three grand prize winners will be given Intel Ultrabooks.
If you ask people what they like least about the Internet, the three items at the top of their list of complaints will likely be trackers, ads, and viruses.
While you may not be able to eliminate these and other Web nuisances, you can minimize their effect on your browsing via three free add-ons for Firefox, Google Chrome, and Internet Explorer: Ghostery, Adblock Plus, and Web of Trust. (Note that Adblock Plus is not available for IE; blocking ads in Internet Explorer 10 is accomplished by using the program's Tracking Protection feature, as explained below.)
Do-it-yourself do not track … Read more
Yesterday, Avast Software made news with its acquisition of privacy company Secure.Me, a small developer best known for its Facebook apps of the same name. Secure.Me protects users' Facebook accounts, monitoring all activity and photos, detecting malware links, and identifying content that is questionable or unsuitable for children.
Today, Avast makes news again with a minor update to its complete suite of Windows security applications--Avast Free Antivirus; Avast Pro Antivirus, Avast Internet Security, and the full monty, Avast Premier.
Avast version 8.0.1488.286 fixes some bugs in the interface, adds a progress bar to the … Read more
Samsung is now clear to start pitching its new flagship phone to the government.
The handset maker announced Friday that its Knox-enabled mobile devices have been approved by the Pentagon for government use. Samsung's Knox software offers high-level encryption, a VPN feature, and a way to separate personal data from work data. The software also enables IT administrators to manage a mobile device through specific policies.
For now, the Galaxy S4 is the only Samsung device equipped with Knox. But the company promises that other smartphones as well as tablets will receive the security software.
The thumb's up … Read more
Technology doesn't just complicate our lives, it also does a number on our deaths.
Imagine the challenge of accounting for all of your digital assets once you've shuffled off to Buffalo. Even if you consider your e-mail, text messages, and social-media posts disposable, you've probably stored photos, videos, and very personal documents on one or more Web services. You probably want to bequeath some or all of these items to family and friends.
If you run an online business, ensuring a smooth transition in the event of your demise becomes even more important. To ease the burden … Read more
To paraphrase an old expression: Give a man an apple and you feed him for a day; teach a man to phish apple IDs and you feed him for a lifetime -- with stolen data. That's what some bold phishers are hoping for, according to a new report by security intelligence company Trend Micro, which documents a major phishing scam that has already compromised 110 sites in a plan to steal Apple IDs.
We've all heard of a distributed denial of service (DDoS) attack and know what it is: when a person or people attempt to take down a Web site by flooding it with connection requests. These max out the site's bandwidth, making it unable to accept new requests. The attacks are usually automated and can be accomplished in a variety of ways. The loss of traffic during the attack itself, and the recovery afterward, can end up costing Web sites quite a lot.
But what does that actually look like? Well, nothing by itself; but thanks to a Web site traffic visualization tool called Logstalgia, Ludovic Fauvet, developer of the Web site VideoLAN (which created and distributes the free multimedia player VLC), managed to capture an April 23 DDoS attack on his site. … Read more
The White House has NOT been bombed, folks, despite what you might have seen on the Associated Press Twitter account.
Hackers apparently got ahold of the wire service's Twitter feed and tweeted out "breaking" news of a White House bombing that injured President Barack Obama.
Not so, say the Twitter feeds of AP corporate and some employees.
When the tweet went out, Twitter immediately erupted with notes from sleuthing tweeps who noted that the suspicious tweet did not use the normal all caps style for BREAKING news, and was sent from the Web, which is unusual for … Read more
Authorities pursuing a suspect in the Boston Marathon bombing have a love-hate relationship with social media. After initially asking for help via Twitter, law enforcement later requested that social-media users be a little more conscientious about the kind of information shared (or fabricated) on social networks.
In the immediate aftermath of the dual blasts that killed three and injured dozens near the marathon finish line on Monday, law enforcement turned to the public via Twitter and other platforms for help crowdsourcing leads. On Thursday, the FBI released video footage of two young men carrying backpacks near the finish line of … Read more
Microsoft started rolling out its two-step verification process on April 17. Also known as two-factor authentication or two-step authentication, the process strengthens your account security by requiring you to enter your password (step 1), then a security code (step 2). The security code can be sent to you by e-mail, SMS, or phone call, or you can use an authenticator app on your mobile device.
Enabling two-step verification on your Microsoft account will enable it across all Microsoft services that currently support two-step verification, like Windows, Outlook.com, Office, and SkyDrive. If you're interested in trying it out, here'… Read more