You're a student and you're poor. Because of the cuts in Financial Aid (thanks Obama!), you're working at two different McDonalds across town to pay for that triple dorm room. You have to go back to school soon, but you don't have enough money to buy the tools you need to succeed. You resort to piracy and bam, the FBI is on your tail. You flee to Mexico but run into some trouble with the Federales. They deport your behind back to the States and a judge gives you 15 years and says you shouldn't … Read more
Bradley Manning has been sentenced to serve 35 years in prison for turning over hundreds of thousands of classified government documents to WikiLeaks.
Handed down by Colonel Denise Lind on Wednesday, the sentence follows the court's verdict on July 30 that found Manning guilty of nearly all charges against him, though not guilty of the most serious charge, aiding the enemy. Judge Lind had presided over an eight-week court martial in Fort Meade, Md.
Manning's rank will also be reduced from private first class to private, the U.S. Army Military District of Washington said in a press … Read more
Last Friday, a reader named Peter contacted me about a notice that appeared when he tried to sign into his Marriott Rewards account. The notice indicated that someone may have attempted to hack the account and he should change his password. Peter initiated a live chat with the Marriott help desk and was told the following:"There have recently been attempts made to gain unauthorized access to a small number of members' online accounts. I encourage you to visit Marriott.com and change your password as soon as possible to assist us in ensuring the security of your account.&… Read more
Being computer savvy is both a blessing and a curse. While you're always on top of the latest tech trends and the center of attention at parties (so they say), you're also the first person that everyone bothers with their computer problems. Everybody has at least one friend or family member that is the go-to IT person you always call on whenever you have a problem with your laptop, day or night, 365 days a year. If you don't know of one, you're it, and we feel for you. Jumpshot hopes to make the lives of … Read more
Google has never offered Gmail for free just out of the goodness of its heart. There are strings attached. One of those strings is that your e-mail can be scanned and used for activities like serving up advertising.
Google's terms of service haven't changed overnight, but awareness of them has, thanks to a Google filing that says e-mail users should really have no expectation of privacy.
This can be found within a motion to dismiss a class action data-mining lawsuit that objects to Google's e-mail scanning practices. Specifically, the motion quotes the 1979 Supreme Court case Smith … Read more
Parents with baby monitors might want to listen up.
A Houston couple on Tuesday revealed to ABC News that earlier this month, the baby monitor they use for their daughter was hacked. Upon taking control over the monitor, the hacker reportedly shouted obscenities at their sleeping 2-year-old daughter. Before the parents could unplug the monitor, the hacker also shouted at them.… Read more
There is no shortage of Web services to help you verify that a shortened link is legit and not something that's going to load you up with malware or steal personal information. But when it comes to online privacy, it's always good to have options. Instead of adding a "+" to the end of a bit.ly link, or using Unshorten.it, give URL Uncover a look the next time you get suspicious.
On Tuesday, Kaspersky launched the 2014 release of their Internet Security and Antivirus updates. In addition to a much more polished user interface, Kaspersky brings a slew of under the hood improvements and performance gains across the board. New in 2014 is the Application Control center, a hybrid between a system monitor and task manager that also gives you a trust rating of each running application. For full review or to download a trial, click on the Download button below.
If you would like to encrypt a file or two on your Mac to keep it secure, there are several options available to you. There are a number of third-party tools, such as GPGTools' GPG Suite, which offer encryption options for files (more details here), but Apple also offers built-in encryption support with disk images.
While securely wrapping files in disk images generally requires using Disk Utility, you can do so through the command line as well, which may be useful if you are accessing a system remotely through SSH, or scripting a routine where you would like to encrypt … Read more
"Smart bins" are bin and gone. The City of London Corporation has called for Wi-Fi-enabled, data-sniffing bins to stop recording your movements as you wander the streets.
Twelve recycling "pods" with LCD screens showing adverts have been sniffing out details of your phone as you pass and tracking your subsequent movements. But with the local authority flagging the bins to the Information Commissioner's Office, trials of the technology have been suspended.