There was a recent Network World article that reported that some people are freaking out because IF you setup Windows 10 to do facial recognition to log you in, it works even if you have disabled your camera. Call me dumb, but if you ask Windows to use the camera to log you in, it […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The AP is reporting that the IRS didn’t really know how many taxpayers had their information stolen by hackers who used the Get Transcript web site. Originally, the IRS said that hackers tried to get information for about 200,000 taxpayers and were successful in getting information for 100,000 of them. Originally, they said the hack […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
UPDATE August 19, 2015 – As I predicted, there are now web sites which allow you to search the Ashley Madison data. Check this Wired article for links: http://www.wired.com/2015/08/check-loved-one-exposed-ashley-madison-hack/ . The hackers who broke into the Ashley Madison web site last month threatened to make the data that they stole public if Ashley Madison’s parent […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Microsoft is just reading Google’s playbook on destroying your privacy, but that does not mean that you have to drink the entire glass of that Kool-Aid. Here are a couple of things that you can do on Windows 10 to dial back the information theft a little bit. First of all, what does Microsoft tell […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
For those of you who use Bit Torrent to download pirated movies, this post is for you. Microsoft has turned every Windows 10 Home and Windows 10 Pro user into a Bit Torrent node of sorts, delivering Microsoft updates to their millions of customers. Like other Windows 10 features (WiFi Sense, for example), I am […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
HP’s security folks tested the security features on 10 smartwatches along with their cloud and management infrastructure and the results, while not surprising to me, are disappointing. Smart watches are in their infancy; the compute power is relatively limited and, as is usually the case, features win out over security. The question to ask is […]
Continue reading →
[DISPLAY_ACURAX_ICONS]