Latest News
  • Google Calendar users should be cautious accepting invitations

    If you find a strange event in your Google calendar that includes a link to learn more or prepare for a meeting, it could be a trick to get you to click a malicious link.
  • These are the results from a 5G field test conducted in Phoenix

    While much faster speeds will be great, low latency is a much more important benefit of 5G, because it will dramatically reduce the amount of time that it takes to get a response to anything we do online.
  • What you need to know about Bluetooth vulnerability

    Security researchers recently discovered a way to intercept a Bluetooth connection between two devices, leading to the ability to plainly view all of the data being transmitted between them.
  • Windows 10 has vulnerabilities, but far fewer than Windows 7

    Most users of Windows 10 are set up to automatically update the operating system whenever Microsoft releases an update. You probably had the recent critical update installed already.
  • Beware of tech support scams lurking in Google search

    Google’s search technology and algorithms are pretty sophisticated, but they have an ongoing challenge with scammers that are constantly trying to game the system.
  • Ways you can protect your Facebook account from being spoofed

    Anyone that uses Facebook has likely received a friend request from someone that they already had a connection with. When these duplicate profiles appear, that means your profile has been cloned or spoofed.
  • How to tell if your browser has been hijacked and what to do about it

    If you think your browser has been altered or "hijacked" by malware or adware, here's how to find out for certain.
  • What we know and don’t know about using FaceApp

    FaceApp, which allows you to use AI to age a picture of yourself amongst other options, has become a viral sensation and sparked privacy concerns.
  • Breaking down the wonders of image recognition tech Google Lens

    The really interesting feature of Google Lens is its ability to provide lots of information based on the image that it sees via your camera.
  • What are the best tools to help build my business website?

    I’m trying to decide which tools to use to build my business website. What’s the difference between Wix, Weebly and WordPress for a novice?
  • The future of caller ID and how the new program will work

    Our current caller ID technology was developed without any consideration that it could be used nefariously and hasn’t changed much while the technology to exploit it has exploded.
  • MacBook Pro 15 battery recall is too serious to ignore

    It’s important that anyone who purchased a 15-inch MacBook Pro between September 2015 and February 2017 check to see if their laptop is part of a battery recall.
  • Are business reviews on Yelp really more negative than on other sites?

    The observation that business reviews on Yelp are more negative than on other platforms isn’t something you’re imagining.
  • Is iTunes going away? Not quite, but here’s what will happen

    Apple is shutting down iTunes, but the good news is that it's not going to suddenly stop working and every user is in total control over what happens and when it happens or if it happens at all.
  • How do I disable remote desktop in Windows?

    Disabling remote access will help protect your computer from a variety of threats, including unscrupulous tech support scammers.
  • Should I turn my computer off every night?

    The answer for each person will be different depending upon how often you use the computer and how many automated tasks the computer is set up to perform.
  • How do I know if there’s a hidden camera in my rental property?

    Many rental property guests have shared stories about finding hidden cameras in their rooms. Here's how to find out if your host is secretly recording you.
  • Expecting a baby? Here are some technology options to consider

    The world of prenatal health technology is exploding with options that have the potential to better inform expectant parents throughout the pregnancy.
  • How can I give my employees a fake phishing scam?

    Businesses are a primary target of cyber criminals. All it takes is one user in the company to fall for a cleverly crafted email for the infiltration to begin.
  • How can I make sure my Amazon Alexa is not spying on me?

    Voice-activated devices like Amazon Alexa can be helpful in the home, but some of the privacy issues have given users pause.