You probably already saw that some of Mark Zuckerberg’s social channels didn’t have the best weekend, but it seems he wasn’t the only...
It’s been awhile since we reported on a large password hack release, and LinkedIn once again is the target of a huge...
While most business owners advise their employees not to share their passwords with anybody else, there may come times where hackers will...
I just couldn’t resist writing about this one. It could be described as the “worst of both worlds,” instead of the “best...
We’re all pretty sure that whatever country we’re in, we suspect that its authorities are legally free to browse our devices. We...
Hopefully, this series has awakened some to the need to adjust security settings, without launching into full blown paranoia. We do need...
Do you know how to uninstall programs on your window PC? Well it’s time to put that skill to use and head...
Our last few Tech Miser articles have focused on Bluetooth headphones and a few browser extensions. Today I’ll dive into browsers themselves,...
Last time in this series we talked about encryption, viruses and malware, and now we’re going to continue that conversation and talk more about...
We all like to keep our info private and secure and our devices working the way we expect them to. And there...
Last time, we talked about Facebook — not to warn about how bad Facebook is, but to highlight that we’re our own...
If you are still using Flash, you should know that Adobe just patched a critical vulnerability that could have allowed malicious folks...
Last time we talked about two factor authentication, passcodes, and using the cloud. We’re not quite done yet as there are still a...
So far, we’ve dealt with social engineering as a threat and scanners for the credit cards in your wallet. In both cases,...
Last time in our how to avoid tech security and privacy risks, we talked about the lockscreen and passcodes. As we continue...
After all the drama between the FBI and Apple over the iPhone 5c used by the shooter in the San Bernardino shooting, which...
In the last miserly column, we talked about the Jarv Joggerz Pro. Today, let’s start with the Photive BTH3. These are not the...
Techaeris has written in the past about a Steam hack that can drain wallets faster than our own spending. It’s a real threat...
We’ve all seen the movies where spies try to gain access to areas protected by fingerprint scanners, ranging from the extreme (cutting...
Apple’s security battle with the FBI has been aided by the competition. That includes Facebook, Microsoft, and Google, who had at one...
Apple has been in the news quite a bit lately as it pertains to privacy and security. Sure, most of that is...
Microsoft announced an additional level of protection for Windows Defender. They describe it as Advanced Threat Protection. They start by saying this: We...
For once, we’re not here to tell you about a company getting hacked, cracked, or otherwise broken-into via nefarious computer means. Although...
Check Point, a company focused on IT security, has uncovered an eBay vulnerability that allows attackers to bypass the online auction and...
Google seems to go for diversity and serendipity when it comes to things it works on. I say serendipity because they sometimes...
The FTC has said that ASUS has demonstrated a “failure to employ reasonable security practices [that] has subjected consumers to substantial injury.”...
The founder of the Linux Mint project, Clement Lefebvre announced on the official blog that the Linux Mint website was hacked and...
HSBC is launching voice recognition and touch security services in the UK in a big leap towards the introduction of biometric banking. The...