by ray | Feb 16, 2015 | Security
Article from CNN Apple has finally expanded an extra security feature to guard iMessages and FaceTime video chats. The feature, called two-step authentication, provides an added layer of protection against hackers. With two-step authentication enabled, logging into...
by ray | Feb 13, 2015 | Cloud Tools, Google, Google Workspace
Article by Dara Kerr Dropbox pricing plans.Screenshot by Dara Kerr/CNET As Dropbox hosted its first developer conference on Tuesday, conjuring up images of a future without hard drives and announcing its plans for cloud domination, some users still aren’t happy....
by ray | Feb 13, 2015 | Security
Article by Thorin Klosowski Shellshock, the newly discovered vulnerability that allows attackers to inject code into your machine, puts your Mac or Linux at a serious risk for malicious attacks. Here’s how to test if your machine is vulnerable. Shellshock uses a...
by ray | Feb 13, 2015 | General News
Original Article NEW DELHI: Buoyed by the initial response to Android One smartphones, chipmaker MediaTek has said it expects as many as two million handsets to be sold this year in India, the world’s second largest market for mobile phones. The...
by ray | Feb 13, 2015 | Security, Wordpress
Article by Lisa Hoover McGreevy WordPress has struggled in recent weeks with a spate of security issues ranging from malware infections to denial-of-service vulnerabilities. It’s not a big surprise then that Automattic, the open source development company behind...