Radio Shack’s original and core customer used to be the young man who was a tinkerer: ham and shortwave radio operators, guys who hacked telephones […]
Tech News And Reviews
CryptoLocker Ransomware Targeting Android Smartphones
The CryptoLocker ransomware has been wreaking havoc on desktops for months now, demanding that victims pay hundreds of dollars in exchange for the key to […]
Dropbox Leaked Shared Private Files Through Google And Documents
People using shared storage provider Dropbox are leaking data, a competitor has discovered. Dropbox competitor Intralinks stumbled across mortgage applications and bank statements while […]
Apple iOS LockScreen Bypass and E-mail Encryption Bug
Another iPhone passcode bypass is making the rounds this week that reportedly allows users to trick Siri into skirting around the device’s usual lockscreen to […]
Taking Compass Bearing
Align your map to your surroundings. Spread the map out flat. Set the compass dial to North (0 degrees). Lay the compass on top of […]
How To Find North Using a Watch Solar Navigation Wilderness Survival Skills
Being able to navigate using nature is an extremely useful skill, always be aware of what direction you are traveling and always tell someone where you are […]
Pennsylvania Supreme Court Rules Cops No Longer Need Warrants to Search Vehicles
Pennsylvania Supreme Court has ruled police officers in the Commonwealth are no longer required to obtain a warrant prior to searching a vehicle, a […]
Google Stops Scanning Student Gmail Accounts
Google has confirmed to the Wall Street Journal that it will no longer scan student Gmail accounts for ads. The practice was called into question […]
Zero-Day Vulnerability CVE-2014-1776 Affects all Versions of Internet Explorer
There’s a new zero-day vulnerability in many of the current versions of Internet Explorer and is being used in active attacks right now. The exploit […]
Apple Update Fixes OpenSSL Heartbleed Vulnerability
Apple has fixed a serious security flaw that’s present in many versions of both iOS and OSX and could allow an attacker to intercept data […]