Your IP is:

3.145.72.44

[More Detail]


Instant Port Checker

IP:[get my ip] Port1:[EL2/PR2/PM3]   [XON NVR] Port2: Port3:

Skip to content

The new, more productive iOS 8: Spotlight and Notification upgrades make it well worth downloading

Yesterday Apple unveiled the new iPhone 6 smartphones and the upcoming Apple Watch. The new iPhones will be available soon, but even before they hit the street, the latest version of Apple’s mobile operating system, iOS 8, will roll out. 

Of the many new and updated features in iOS 8, two in particular will help people be more efficient: the new Spotlight search, and Notification Center. Both help you find what you need to find, and do what you need to more simply, and with fewer swipes and taps.

Categories: General.

Tags: , , , , , , ,

Internet Explorer steals the Patch Tuesday spotlight again

It’s hard to imagine that we are already three-fourths of the way through 2014—at least as measured by Microsoft Patch Tuesdays. Today, Microsoft released four new security bulletins, but only one of them is Critical. Guess which one?

Yes. Internet Explorer. Once again Microsoft’s web browser takes center stage as the most crucial of the Patch Tuesday security bulletins. Microsoft resolved a grand total of 42 separate vulnerabilities this month, but 37 of those 42 are addressed in MS14-052—the cumulative update for Internet Explorer. One of the flaws fixed by MS14-052 is publicly known and actively under attack in the wild, which is why this security bulletin is Critical.

Categories: General.

Tags: , , , , , ,

Don’t blame iCloud yet for hacked celebrity nudes

Over the Labor Day weekend, hackers leaked nude images of a number of celebrities including “Hunger Games” star Jennifer Lawrence. The images appear to have been acquired from Apple’s iCloud. So, iCloud is obviously insecure and everyone should stop using it—right?

Let’s just cool our jets. Yes, iCloud appears to have played a role in at least some of the hacked nude celebrity images, but details are still too sketchy to start connecting dots that indict the entire Apple cloud storage service.

Categories: General.

Tags: , , , , ,

The game is not yet over for Gameover Zeus botnet

If you’ve ever watched a horror movie, you know the trope where the hero seemingly kills the monster, but as soon as he turns his back to walk away the monster regains consciousness and attacks again with renewed vigor. According to the latest report from F-Secure, that’s the sort of scenario we might be looking at with the Gameover Zeus botnet.

Categories: General.

Tags: , , , ,

Citrix ShareConnect extends the power of your PC to your tablet

In an ideal world, a tablet would be an extension of the PC—a device that is more portable, yet still enables users to continue work done while on the go. Tablets like the iPad and Samsung Galaxy Tab do work in that capacity to an extent, but not seamlessly. Citrix is changing things, though, with the launch of Citrix ShareConnect, which it calls a remote access innovation that extends the promise of mobile workspaces on any device.

Categories: General.

Tags: , , , ,

Report: Businesses at risk from unreported mobile device theft

Part of a company embracing mobile devices is ensuring tools are in place to remotely wipe sensitive data from a smartphone or tablet if it is lost or stolen. A new study from Kaspersky Lab identifies an obvious and concerning fact, though—those tools offer little value if the missing device isn’t reported.

Kaspersky Lab surveyed nearly 4,000 IT professionals regarding mobile device security concerns. The results illustrate the challenges facing IT managers and an apparent disregard among users for securing mobile devices or protecting business data.

Categories: General.

Tags: , , , , , , ,

5 reasons a small Windows tablet might be in your future

There are a number of smaller Windows tablets hitting the shelves now from Microsoft OEM partners and more on the horizon. At face value it seems like a late attempt by the Windows ecosystem to get in on the mobile device game. The reality, though, is that Microsoft can still capture a respectable—possibly dominant—stake of the tablet market.

Categories: General.

Tags: , , , , ,

Rumored 12.9-inch iPad could be better for business productivity

Apple is reportedly planning to launch a 12.9-inch version of the iconic iPad tablet sometime in early 2015. A larger iPad could be a more effective tool for mobile business users, but only if Apple also addresses a few other issues.

A bigger iPad makes sense on a few levels. Samsung, Apple’s chief rival in mobile devices, already offers a larger tablet. And Microsoft recently bumped its Surface Pro tablet from 9.7 inches to 12.2 inches. Smaller tablets like the iPad Mini or the Google Nexus 7 fill a need, but when it comes to real-world productivity, bigger is better.

Categories: General.

Tags: , , , , , ,

Report: Consumers concerned about online threats but do little to protect themselves

Remember banking before the Internet? You received printed bank statements in the mail and had to manually reconcile the information with the written register in your checkbook. I don’t miss it, but I also recognize the convenience of accessing my financial data through a bank website comes with some serious security considerations. According to a new consumer survey from Kaspersky Labs, I am not alone.

Categories: General.

Tags: , , , , , , , ,

Your living room is vulnerable to cyber attacks

At the Black Hat security conference in Las Vegas earlier this month, researchers demonstrated how a Nest thermostat can be hacked, to show how easily connected appliances—the household technologies that make up the Internet of Things—can be compromised. When you look beyond the demo’s hyperbolic headlines, it turns out the hack requires physical access to the Nest device, but the questions remains, “How vulnearable is IoT?”

To find out, David Jacoby, a security researcher with Kaspersky Lab, hacked his own living room. 

Categories: General.

Tags: , , , ,