Is your smart phone spying on you? In short, yes. Follow the simple guide below to find out how to protect yourself. Apple Frequent Locations iPhones track your location data down to the minute. Who uses this information: Third party advertisement: If you visit a shoe store, you might receive shoe advertisements. Apps: Apps may […]Read More →
Google held their press event on Tuesday, September 19th in San Francisco announcing many new products such as the Nexus 6P and 5X, the new Chromecast 2, Chromecast Audio, and the Pixel C. They also announced their new Operating System. Nexus 6P This was the most anticipated product coming out of Google and is considered […]Read More →
With the recent scares about Android’s ‘StageFright 2.0’ bug, that you get by opening a MP3 or MP4 file, it might get your wondering more about whether you have or had a bug on your phone. Different malware includes adware, bug, spyware, Trojan horse, virus, and many more (Learn more about Malware types ) There are some […]Read More →
Masque Attack was a recent vulnerability involving Apple’s mobile operating system that would allow hackers to use web pages, text messages, and emails to trick people into downloading fake apps that disclose personal information. The concern is that fake apps resembling real apps such as banks or email program could replace genuine apps installed through […]Read More →
Help Alexa and Siri Find Your Business During Voice Search
You Can’t Just Tell Voice Search About Your Business Voice search is…
Net Neutrality Repeal Ruins the Internet
The Information Age When the Web emerged in 1989, few could have predicted…
Let’s Get Visual
Visual marketing continues to be on the rise, this makes sense as people ar…
- Do I Need Alignable?
- Why Is It Important To Know Who Owns Your Representative? One Example: Glass-Steagall
- Why Labor Unions Need Social Media
- Social Media Copyright Issues: Fair Use or Infringement?
- Dimitri Vassilaros – Media Services
- There’s an App for Labor Organization
- What’s a Twitter Storm?
- KRACK Wi-Fi Attack and What You Need to Do
- Cat Tech Tips: Cleaning the Computer