Source: National Cyber Security – Produced By Gregory Evans Meet these 5 child geniuses who could be the future of cybersecurity Cybersecurity industry is hunting for new talent due to severe shortfall of skilled professionals in this field and it seems the industry has already got five child geniuses. In this…
Get these 10 paid iOS apps without paying a dime
Looking to load up your Apple iPhone with new apps, but don’t want to dip into your wallet to pay for them? Today, we have 10 paid apps that are free for a limited time. That could mean that as early as tomorrow, these apps will return to their regular…
Samsung Galaxy S6 edge+ is expected to have these enhanced People Edge features
On August 13th, the Samsung Galaxy S6 edge+ will be introduced along with the Samsung Galaxy Note 5. According to a published report, one of the new features on the Galaxy S6 edge+ takes the “People Edge” that allows you to store up to five contacts on the edge of…
These are Motorola’s phones that will get ‘Stagefright’ fix
Motorola has announced which devices it’ll be issuing software updates for a number of its devices to combat the potential “Stagefright” exploit, which theoretically could allow a malicious MMS video message an avenue of attack into a user’s phone. Motorola was quick to point out that it’s not aware of…
These Motorola smartphones will get security patches to address the Stagefright vulnerability
In the wake of Stagefright (a recently discovered Android vulnerability that makes it possible for hackers to remotely access phones without owners consent), Google, Samsung, and others have already announced security updates that will be pushed regularly to select devices. Motorola is also doing something in this regard: the company…
Love Crossy Road? Try these 7 casual obstacle games for Android and iPhone
The year was 1981 when the game Frogger came out. Its objective – to help a bunch of frogs cross a busy highway and a hazardous river – was simple, but innovative enough to draw the attention of players of all ages. And they couldn’t get enough of it. Frogger…
Don’t fall for these 5 online vacation rental scams
Source: National Cyber Security – Produced By Gregory Evans Do travelers trust online marketing for their vacation rentals? According to one recent website, 48 percent of us trust search engine results, and 42 percent trust banner ads when looking for vacation rentals. The proliferation of online scams, however, should give…
Take these 6 security measures to protect your IoT devices from hackers
Source: National Cyber Security – Produced By Gregory Evans BI Intelligence estimates that by 2020 there will be more than 23 billion IoT devices connected to the internet. One of the biggest challenges in connecting so many devices will be in securing them to prevent hackers from controlling them or…
Learning from Mistakes: What These 4 Big Data Breaches Teach Us
Source: National Cyber Security – Produced By Gregory Evans Nobody is perfect. Everyone makes mistakes, and anyone can fail — especially in the business world. IBM’s “2015 Cost of Data Breach Study” shows that the average total cost of a data breach is $3.8 million, representing a 23 percent increase since…
Do these 5 things immediately when your credit card is compromised
Source: National Cyber Security – Produced By Gregory Evans Finding out your financial information has fallen into the wrong hands can be unnerving. If your credit card has been lost, stolen, or otherwise compromised, your first reaction may be one of fear. But don’t let a scary situation take a…