The Top Tech Stories Of 2011

2011 was a fantastic year for tech startups with Initial Public Offering’s (IPOs) happening left, right and center, social networks bringing down dictatorships across Africa and the general web experience for users getting better than ever before. On the down side we lost some of the greatest businessmen and innovators of modern times and Google put many legitimate websites out of business due to their Panda updates. We have rounded up the biggest and best tech/web stories from 2011 but don’t forget to share your own thoughts in the comments below....

January 21, 2022 · 5 min · 945 words · Gabriela Sutton

This 9 Year Old Coder Is Better At Programming Than Professionals

So, today we will be talking about a 9-year-old girl who is the youngest ever developer to attend Apple’s WWDC 2016. Guess what? This 9-year-old girl is better at coding than most of the professionals. Anvitha Vijay is one of the recipients of 350 scholarships handed over by the Apple CEO Tim Cook at WWDC event 2016. Awarding Anvita who is just 9 years old and showcasing her as the youngest iOS developer might be Apple’s strategy....

January 21, 2022 · 2 min · 351 words · Denise Oppenheim

This Anti Virus Software S Email Protection Service Exposed Users To Banking Malware Komando Com

They massively send out phishing emails pretending to be someone you know and trust. Most of the time, they also forge web addresses and domains to conceal suspicious links to try and fool you into clicking. With their ever-growing bag of tricks, it’s impossible to keep up! That’s why we often rely on our security software to do the heavy lifting and automatically protect us from such threats. But what if hackers manage to find their way around our trusted protection systems too?...

January 21, 2022 · 3 min · 553 words · Nicolas Medley

This App Will Give Your Android Phone Ios 14 S Camera And Mic Icons

Why is iOS 14 better for privacy? It’s not that Android 11 is a slouch — but features like iOS 14’s new camera and microphone icons are making it easy to tell that apps are snooping when they shouldn’t. Tap or click here to see how these icons exposed the Instagram app. If you’re an Android user wishing you could tell if your camera or mic were recording, you don’t have to switch to an iPhone to find out....

January 21, 2022 · 4 min · 667 words · Yolanda Anderson

This New Look Gmail Is Now Rolling Out To Everyone

Google has lifted the curtains on parts of the revamp after a preview in January and later updates in February showing the new “integrated view” for Gmail. These were opt-in changes for Workspace users and now they’ve become standard for all Gmail users. The new-look Gmail has a left column with shortcuts to Mail, Chat, Spaces and Meet. The integrated view will first roll out to users who have turned on Chat, according to Google....

January 21, 2022 · 2 min · 422 words · Erik Richner

This 17 Year Old Windows Bug Is Finally Being Fixed

Just like usual, you’ll be able to get the patches via Windows’ update system. It’s easy to do, but you’ll want to make a backup before going too far. Tap or click here to see 5 steps to backing up your data like a pro. But what makes this month’s Patch Tuesday different, however, is one particular vulnerability that has persisted for more than 17 years. If you’ve been a Windows user since 2003, you’ve had something wrong with your computer this whole time without ever knowing!...

January 20, 2022 · 3 min · 560 words · Minnie Miller

This Apple Leak Reveals Radical New Iphone Xi

This Apple Leak Reveals Radical New iPhone XI We all know very well that the tech giant Apple is currently going through a bad phase, as recently it has faced some loss in the stock market, drop in the sales of its products and sales ban of some iPhone models due to the action of Qualcomm. Hence, now according to the rumors spread by the well-known media platform, Bloomberg which is encouraged by the well-known multinational company, Sony itself, the all-new upcoming iPhone 11 or iPhone XI of 2019 could include a 3D camera sensor which will simply revolutionize the photography on smartphones....

January 20, 2022 · 3 min · 483 words · Ray Cirone

The Great Vfm Debate What The Hell Is Value For Money

“It’s a great value for money device.” “The company doesn’t make value for money phones anymore.” These are the usual statements you get to see on social media after every phone launch from a popular brand. But what exactly is Value for Money (VFM)? Who defines it? The company selling the product? The tech experts reviewing these products? The general public on forums and social media voting on one of these polls?...

January 19, 2022 · 3 min · 433 words · Ryan Anderson

The Importance Of C Level Security Awareness Training

First Phishing… The most common form of cybercrime involves tricking the recipient of a message into clicking on a link – once it is clicked, the bad guys are past the front gates and able to burrow into the computer and spread through a network. This has been traditionally called “phishing,” a play on the word “fishing.” The term is primarily associated with spam emails that are sent en masse to millions of inboxes – an estimated 156 million per day....

January 19, 2022 · 5 min · 855 words · Sabrina Bowers

These Are The Cybersecurity Threats Of Tomorrow That You Should Be Thinking About Today

This combination is proving difficult for many companies to keep up with, resulting in security holes in networks and vulnerabilities left unpatched. These flaws are relatively simple elements of cybersecurity to manage, but ones with which many organisations are still attempting to grapple. Even more bad news: the way in which cybersecurity and cybersecurity threats keep evolving means there’s the risk that many businesses could be left behind and dangerously exposed as technology moves forward – and cyber threats move forward with it....

January 19, 2022 · 7 min · 1378 words · George Reese

These Are The Top Passwords Hackers Use Against Remote Access Time To Change Yours

The two protocols – Remote Desktop Protocol (RDP) and Secure Shell (SSH) – are widely used for managing virtual machines in the cloud. With the growing popularity of both cloud deployments and remote work, the researchers said it’s important to know how opportunistic attackers are targeting these systems. Rapid7 found the three most popular usernames for RDP are “administrator”, “user”, and “admin”. RDP is a top target for ransomware attackers....

January 19, 2022 · 4 min · 742 words · Wanda Lee

These Atm Like Kiosks Loads Pirated Movies To Your Usb Sticks

However, if you are in Ethiopia, then you can easily dodge the troublesome task to search, download and wait because Ethiopia has some ATM type machines that spit out latest movies straight to your USB Stick. Torrent Freak reported a few kiosks have started popping up across a mall chain in Addis Ababa which is the capital of Ethiopia, these kiosks let anyone download their desired movie straight to their USB drive....

January 19, 2022 · 2 min · 240 words · Arthur Kelly

This 14 Year Old Girl Dies While Charging Smartphone

The minor, a resident of Lubbock, Texas, as we told, was in the tub of her father’s house in Lovington, New Mexico when she reportedly attempted to connect her cell phone to the charger or pick it up from where she was connected. Grandmother and her mother in an interview with the KCBD news portal. Madison Coe’s grandmother Donna O’Guinn said that “There was a burn mark on her hand, the hand that would have grabbed the phone....

January 19, 2022 · 2 min · 352 words · Nicholas Pettway

This Bug Leaves Intel Run Pcs At Risk Even If They Are Switched Off

It turns out that the website of the so-called Active Management Technology (AMT), the system management platform that Intel offers to enterprise equipment managers to facilitate the control of all PCs, hides a security hole that allows access Remote to all the computers on that network that incorporate a concrete model of processor. This page is designed to allow control of the mouse and the keyboard of the devices, as well as the ability to access the files on the computers that are turned off....

January 19, 2022 · 3 min · 463 words · Donald Steele

This Calculator Will Show You Your Covid 19 Risk Factor For Death

While the vast majority of cases are mild or asymptomatic, there are certain telltale signs to look for that point to a worse infection. Tap or click here to see the COVID-19 symptoms to look out for. But rather than guess, wouldn’t it be better if we knew what our individual risks were before going outside and potentially exposing ourselves to the virus? Well, this new calculator created by U....

January 19, 2022 · 3 min · 597 words · Douglas Miley

This Hack Can Reveal Private Email Address Of Any Facebook User

“The hack allowed me to harvest as many email addresses as I wanted from anybody on Facebook, it didn’t matter how private you thought your email address was – I could of grabbed it” the bug bounty hunter, Tommy DeVoss said. On ‘Thanksgiving Day’ the bug bounty hunter, Tommy DeVoss discovered this critical flaw, and then quickly he reported the security flaw to the social media giant Facebook via its bug bounty program....

January 19, 2022 · 2 min · 412 words · Stephanie Mitchell

The Bosma Aegis Smart Lock Drops To 90 Until Oct 12

If you’ve been reading about how to create a smart home, you’ve probably compared the advantages of a smart lock over traditional locks. But did you know you can make your existing deadbolt smart in just 10 minutes without having to change your lock? All you’ll need is a screwdriver. The Bosma Aegis Smart Door Lock is super easy to install. It replaces the indoor portion of your current deadbolt and allows you to keep your key as a backup....

January 18, 2022 · 2 min · 311 words · Dreama Hines

The Ramifications Of Jailbreaking Your Smartphone

In this regard, its biggest bonus is that it can be used anytime, and anywhere from any point on the globe (this, of course, assuming that your carrier has international reach). Both our personal and work related matters can be conducted upon it. However, even despite all of this, we still continue to demand more and more out of our Smartphone. Really, in a way, it seems that over a period, we can become “bored” with the functionalities that are provided it by the manufacturer....

January 18, 2022 · 11 min · 2298 words · Dean Ward

These Family Plans Will Save You Money Even If You Aren T Family

Some of your subscriptions may have started as free trials but are no longer free. Then there are apps you pay for that can be substituted for ones that don’t cost anything to use. Tap or click here for five mistakes you’re making that cost you money. If you’re using the same services as other family members, you can bundle costs into family plans and save. Some of these plans don’t require everyone who uses the service to be related or live together....

January 18, 2022 · 5 min · 1020 words · Bret Jaji

This Master Key Can Hack Any Hotel Room

If you think that your hotel room is safe, it may not be that good, say a security researcher who left without the laptop. Hotel room door: an easy challenge for hackers When we talk about hotel rooms we are talking about strange places. This is because, if we think about it, we register our presence, usually for a short time, where we leave our luggage with belongings that can be very valuable and usually do not have the security care we have in our homes, for example....

January 18, 2022 · 4 min · 724 words · Patricia Nicholson