HOW TO: Tech Security: Part 7 – App Permissions, Location Services
Hopefully, this series has awakened some to the need to adjust security settings, without launching into full blown paranoia. We do need a wake up … Read more…

Hopefully, this series has awakened some to the need to adjust security settings, without launching into full blown paranoia. We do need a wake up … Read more…
Last time in this series we talked about encryption, viruses and malware, and now we’re going to continue that conversation and talk more about encryption. Point A … Read more…
Last time we talked about two factor authentication, passcodes, and using the cloud. We’re not quite done yet as there are still a couple of places … Read more…
Last time in our how to avoid tech security and privacy risks, we talked about the lockscreen and passcodes. As we continue investigating how we … Read more…
So far, we’ve dealt with social engineering as a threat and scanners for the credit cards in your wallet. In both cases, thieves and scammers … Read more…
Last time, we talked about Facebook — not to warn about how bad Facebook is, but to highlight that we’re our own weakest link in … Read more…
We all like to keep our info private and secure and our devices working the way we expect them to. And there are a whole … Read more…
Here are seven simple pieces of home security tech that have a significant impact on the safety of yourself and your loved ones.
Both Apple and Google have problems with the United States Senate antitrust bills being considered for big tech companies.
While we like to think that healthcare organizations have our best interests at heart, the truth is they are vulnerable to cyberattacks.
As of today, security tech is already far advanced, but there’s always room for improvement.
As social distancing and remote working continues, educational institutions are becoming increasingly reliant on digital tools and platforms such as Zoom, Google Classroom, TopHat, Kahoot, and custom solutions as an alternative.
More businesses are starting to move their processes onto the cloud, which comes with security improvements.
If your organization is in the market to buy a security product, it is like playing the most complex game of marry, date or dump ever.
The 4K Ultra HD Video Security Systems will be available in 8-Channel and 16-Channel sets for complete visual coverage indoors and outdoors with video resolution four times clearer than 1080p.
Basically, it’s the same game only now the chip reader is the target.
With a 1944p HD resolution, this Wisenet security system offers 2 1/2 times clearer resolution than standard 1080p security systems.
If you’re not a brand fanboy, you’ve most likely tried a variety of phones, all with different OSes, each tried for different reasons. And, as … Read more…
CNNMoney has a short interview with Google’s Eric Schmidt where he answers some questions about some of Tim Cook’s comments concerning Google, privacy and online … Read more…
Here are seven rising technology trends in aviation to keep in mind as the industry works its way to pre-pandemic levels.
A great deal of the technology that is seen today has its roots deeply embedded in math and calculations. Here is how the newest tech is changing that computational workload.
Techaeris has worked with many brands and reviewed a slew of devices over the years, some of which are offering some fantastic 2022 Amazon Prime Day deals.
Protecting your sensitive information is more critical than ever if you are a business owner or a consumer.
Here are 10 cool tech add-ons that will transform how you drive and keep you safer in off-road situations. Read on for more!
Here are the seven most impressive pieces of everyday technology that have earned every bit of praise that comes their way.
It’s important to take extra precautions to protect your computer from cyber threats. Here are three ways to increase cybersecurity while working remotely.
2FA isn’t a bulletproof security measure, but it is a good layer of protection to your security bubble; here’s how to use your phone as a 2FA security key.
Now, more than ever, technology is playing a profound role in that process. In the hands of a skilled teacher, a dedicated student, and a supportive family, educational technology is transforming learning and learners alike. Indeed, now more than ever, technology is shaping the future of education.