The average user’s upgrade cycle for smartphones and tablets is around two years. If the old device is still in good shape once the user upgrades, individual users and small businesses usually sell it or pass it along to someone else. Big companies send obsolete devices to companies that specialize in recycling end-of-life electronics.… Read More »
TSA Bars Dead Electronics from Certain Incoming International Flights
On July 6th the United States Transportation Safety Administration announced passengers flying into the U.S. from Europe and the Middle East will soon have to power on their cell phones and other electronic devices. If the device will not power on, it won’t be allowed on the plane. The TSA has required international passengers to… Read More »
Safeguarding Digital Evidence on Wireless Devices
On June 25th, the US Supreme Court struck a blow for digital privacy rights by ruling that in most cases police must get a search warrant before searching a suspect’s cell phone. The court ruled unanimously on two separate cases, one involving a feature phone and the other a smartphone. There’s no question any cell… Read More »
Kidnapping Orchestrated by Inmate With Cell Phone
It seems every week there’s a story in the news about the number of cell phones confiscated from prison inmates. A recent incident in the American south provides a dramatic illustration why correctional facilities cannot afford to allow this problem to continue. In 2012, a North Carolina gang member with a long history of violent… Read More »
Think only the military has drones? Think again.
Just a few years ago, only militaries and government agencies had access to sophisticated drones, but today anyone can buy them for just a few hundred dollars. The basic hardware has been around for decades in the form of remote-controlled helicopters. Today drone operators can equip them with high-definition cameras, Wi-Fi detection tools and other… Read More »
7 Simple Ways Business Owners Can Protect Routers From Malware
Routers are basically very specialized computers, and unfortunately they can get malware too. Routers are susceptible to altered firmware installed by hackers and software worms that replicate directly through the network. A compromised router can allow hackers to steal data and gain access to other devices on the network, so it’s important to keep your… Read More »
4 Simple Ways to Keep Your Business Secrets Safe
Governments have been using cyber espionage to spy on one another almost as long as the Internet has been around. Likewise, cyber crime is nothing new. Until relatively recently, the two were distinct. Governments stole military secrets from other governments, and criminals stole money from banks and private enterprises. Now the two have come together.… Read More »
Protecting Your Bitcoin Wallet from Virtual Pickpockets
Bitcoin is a form of worldwide electronic currency not tied to a specific country. This makes it a popular form of international trade, especially in countries where the local currency has little value. In November 2013, Bitcoins hit an all-time high of $1,124.76 US dollars. While the exchange rate has fallen in the last… Read More »
- « Previous Page
- 1
- …
- 15
- 16
- 17
- 18
- 19
- 20
- Next Page »