By Rob Dunn Contributing Writer, [GAS] Aside from malware/spyware and viruses, the biggest trouble with most home computers can probably be attributed to the build-up of user data over time. You’ve seen it happen over and over again: digital pictures, videos, documents, spreadsheets, and more fill up the drive and eventually adversely affect the performance […]
By PatB Contributing Writer, [GAS] The Pew Internet research team recently published a poll saying less than half of us have ever performed an “ego search,” or an internet search of ourselves, using either Google or some other search engine. From the AP here: More Americans are Googling themselves — and many are checking out their […]
In the past, I have been a frequent critic of the activism that the Electronic Frontier Foundation has engaged in, specifically regarding national security issues involving electronic monitoring of networks. I believe that monitoring networks keep us safe and the EFF does not. And when it comes to their latest crusade against Comcast over bandwidth […]
In this segment of The Real Hustle, the hustlers demonstrate why you should always keep an eye on your credit / debit card – no matter what happens around you.
Yeah you read that right. In order to promote their Norton 360 product, Symantec Japan just released a new ad featuring their “Norton Fighter” mascot. While the footage may look a bit cheezy at first, the whole production is undeniably cool-looking, complete with crappy background music and Power Ranger-like fighters. Check it out! I’m sure […]
Think that chatting to your friends over a Bluetooth signal will keep your discussions perfectly safe and confidential? If you do, than think again! The following video tutorial will teach you how to easily eavesdrop on almost any mobile phone conversation made through a Bluetooth headset. All it takes to get started is a laptop […]
If your servers’ services are exposed in one way or another to the Internet, having a reputable IT security firm run a scan on them might be a good idea. Qualys, a company specializing in vulnerability management, just launched a free service allowing you to scan any box that has a public IP address for […]
The Federal Bureau of Investigation employs a crack team of cryptanalysts to break ciphers that criminals use. Some ciphers are simple, such as the codes that numbers runners and other bookies use for illegal gambling. Others are a bit tougher, such as codes used between gangsters in prison and their organized crime families still on […]