by ray | Aug 10, 2015 | Cloud Tools, Security
The Apple Watch could become our central hub in a wheel of identity, in which all spokes rotate around our wrist. Some early Watch apps already have a high degree of utility. But we’re only scratching the surface of what’s to come. In this roundup, we look at six apps...
by ray | Aug 10, 2015 | Security
Late Thursday night, Mozilla released a security patch for the Firefox browser after finding a serious vulnerability being exploited in the wild. The vulnerability allows malicious attackers to use some JavaScript magic to “search for and upload potentially...
by ray | Aug 10, 2015 | Security
Windows 10 has some handy new features, but if you believe the rest of the internet, it also comes with features that eviscerate any semblance of privacy. But that view is a little overblown. Let’s take a closer look at what each of these settings actually do—and...
by ray | Aug 9, 2015 | Security
It took some time for Kevin Stecko to learn in 2013 that the e-commerce system for his website, 80stees.com, had been hacked. Whoever did it “sat on the [data] for about six months,” Stecko says. “We didn’t notice anything.’’ He doesn’t know how the breach happened,...
by ray | Aug 9, 2015 | Security
This may seems like a stretch, but you’d be surprised by the amount of personal information Windows 10 collects from its users—information including phone numbers, GPS location, credit card numbers, and even video and audio messages. Of course, Microsoft’s privacy...
by ray | Aug 7, 2015 | Security
FOR A SECRETARY of state, running your own email server might be a clever—if controversial—way to keep your conversations hidden from journalists and their pesky Freedom of Information Act requests. But ask a few security experts, and the consensus is that it’s not a...