If you are still using Flash, you should know that Adobe just patched a critical vulnerability that could have allowed malicious folks...
Last time we talked about two factor authentication, passcodes, and using the cloud. We’re not quite done yet as there are still a...
Last time in our how to avoid tech security and privacy risks, we talked about the lockscreen and passcodes. As we continue...
Unlocking iPhones is rapidly becoming old hat for the FBI and now they are offering assistance to other agencies in unlocking iPhones in...
Panopticlick is an online testing tool and research project put together by the EFF (Electronic Frontier Foundation) designed to test how trackable...
After all the drama between the FBI and Apple over the iPhone 5c used by the shooter in the San Bernardino shooting, which...
In the last miserly column, we talked about the Jarv Joggerz Pro. Today, let’s start with the Photive BTH3. These are not the...
The FBI hacks the iPhone 5C that has been the topic of heated debate over privacy, security and encryption these past few...
So far, we’ve dealt with social engineering as a threat and scanners for the credit cards in your wallet. In both cases,...
Verizon enterprise solutions has been the victim of a pretty significant hacker attack in which the attackers have put the stolen data...
Last time, we talked about Facebook — not to warn about how bad Facebook is, but to highlight that we’re our own...
Apple servers, you might find surprising, aren’t built by Apple and now the company thinks some may have been tampered with. According...
Cellebrite, an Israeli security firm, is on board with the Federal Bureau of Investigation actively trying to crack the encrypted iPhone 5C...
We all like to keep our info private and secure and our devices working the way we expect them to. And there...
A new iOS exploit, discovered by an undisclosed party, could potentially help the FBI access the iPhone Apple has refused to backdoor...
An iMessage security flaw discovered by Johns Hopkins University researchers allows hackers to intercept and decrypt images and video sent via Apple’s iMessage...
ProtonMail beta has officially closed and the company is now accepting new users and signups as of Thursday, encryption for everyone. The...
Techaeris has written in the past about a Steam hack that can drain wallets faster than our own spending. It’s a real threat...
Malvertising is something publishers absolutely do not want happening on their websites but it does and it’s recently happened to a handful...
The encryption debate just seems to be getting hotter and hotter as the battle between Apple and the FBI continues to grab...
We’ve all seen the movies where spies try to gain access to areas protected by fingerprint scanners, ranging from the extreme (cutting...
Apple’s security battle with the FBI has been aided by the competition. That includes Facebook, Microsoft, and Google, who had at one...
Apple has been in the news quite a bit lately as it pertains to privacy and security. Sure, most of that is...
Microsoft announced an additional level of protection for Windows Defender. They describe it as Advanced Threat Protection. They start by saying this: We...
For once, we’re not here to tell you about a company getting hacked, cracked, or otherwise broken-into via nefarious computer means. Although...
Check Point, a company focused on IT security, has uncovered an eBay vulnerability that allows attackers to bypass the online auction and...
US District Judge Richard Jones has ruled that Tor users lack a reasonable expectation of privacy and also revealed the government paid...
New information in the Apple VS. FBI case is emerging showing that Apple was contacted just three days after the shooting and complied...