1. Turn Bluetooth Off When You're Not Using It

  2. Master data analytics and deep learning with this $35 Python certification bundle

  3. Understanding and administering systemd :: Fedora Docs Site

  4. 11 top cloud security threats

  5. IBM launches blockchain-based supply chain service with AI, IoT integration

  6. Decoding Apple’s Touch Bar philosophy

  7. New Android Warning: These 15 Malicious Apps May Be Hiding On Your Phone—Uninstall Now

  8. Congress Probes Bot-Generated Social-Media Messages About E-Cigarettes

  9. Permanent Record (autobiography) - Wikipedia

  10. eBay, Visa and Mastercard pull out of Facebook's Libra cryptocurrency

  11. Uber moves into on-demand grocery delivery with acquisition of Cornershop

  12. Improve your smartphone life in 20 minutes

  13. Hack Netflix with these add-ons and tricks

  14. How to Prevent Apple Employees From Listening to Your Siri Commands

  15. Why Apple Killed The MacBook Pro

  16. Lawyer Offers Warning After Almost Falling Victim to Extremely Sophisticated Phishing Scam

  17. New Amazon Spying Scandal—Your Home Videos Are Being Watched

  18. Apple Glasses: Release Date, Price, Specs, Leaks and More

  19. USB-C Has Finally Come Into Its Own

  20. No One Knows About Two-Factor Authentication, and It's Putting Their Security at Risk

  21. Net neutrality: No, your browser can’t protect you. But a VPN can

  22. Google and Levi's built a new gesture-sensing smart jacket

  23. Never Trust a Platform to Put Privacy Ahead of Profit

  24. Apple is finally fixing its dreaded MacBook Pro keyboard design once and for all

  25. Apple removes app used by Hong Kong protesters to track police movements

  26. Think California's Preemptive Blackouts Are Scary? Buckle Up

  27. 10 hidden tricks every Amazon shopper should know

  28. 7 ways 5G mobile networks will change IoT security, and how to prepare

  29. Justice Department takes another run at encryption backdoors with ‘lawful access’

  30. Apple Arcade and Google Play Pass will be totally different stores

  31. Samsung Galaxy Watch Active 2 review: ‘good’ is as good as it gets

  32. Decryptors developed for new Muhstik and HildaCrypt ransomwares

  33. Tomorrow's attacks today: How to defend against next-generation cyberattacks | SC Media

  34. Kernel privilege escalation bug actively exploited in Android devices

  35. The best open source software of 2019

  36. 5 OT security takeaways CISOs need to communicate to stakeholders

  37. The courts have ruled: Mobile sites must be accessible. But why did enterprises ever resist?

  38. More than 30 civil rights groups call for end to Ring's police partnerships

  39. VPNs won't solve these 3 problems for you

  40. Apple Confirms Serious MacBook Pro Problems In MacOS Catalina

  41. Samsung Issues Critical Galaxy And Note Warning For 40 Million Users

  42. Multiple Problems Reported With New Windows 10 Updates

  43. How to Avoid Airbnb Scams

  44. US Supreme Court says Apple's victory against University of Wisconsin stands - 9to5Mac

  45. 7 Cybersecurity Threats That Can Sneak Up on You

  46. Apple's new Mac update is out, and iTunes is finally dead

  47. Google will use AI to optimize how often users see ads

  48. New York City uses Israeli tools to crack into locked iPhones

  49. Satya Nadella looks to the future with edge computing – TechCrunch

  50. Can Grocery Stores Survive the Age of Big Tech?

  51. An Extremely Thorough Guide to This Year’s Flu Season

  52. FBI’s Use of Foreign-Surveillance Tool Violated Americans’ Privacy Rights, Court Found

  53. How to find out if your apps are compatible with macOS Catalina

  54. Google now requires Digital Wellbeing and USB-C PD charging standard for new Android phones

  55. 10 most important tech trends of the decade

  56. FBI warns about attacks that bypass multi-factor authentication (MFA) | ZDNet

  57. How the Linux screen tool can save your tasks if SSH is interrupted

  58. How Gmail filters can help organize your inbox

  59. Multiple zero-day vulnerabilities found medical IoT devices: CISA | SC Media

  60. How to Find and Use Google's Brand-New Privacy Tools

  61. The iPhone 11’s Deep Fusion camera arrives with iOS 13.2 developer beta

  62. The world is finally fighting back against Facebook

  63. Microsoft has a plan to make dual-screen laptops and phones work in the real world

  64. Google launches Password Checkup security tool | SC Media

  65. Microsoft doesn’t think Windows is important anymore

  66. Barr Pushes Facebook for Access to WhatsApp Messages

  67. Galaxy Fold lasted for 120,000 folds

  68. Microsoft's new hardware strategy should worry Apple and Intel | ZDNet

  69. Amazon's Kindle Matchbook Program Ends on Oct. 31

  70. The Google Maps feature we’ve been waiting for is finally here

  71. When to Expect Apple's Next Event: 16-Inch MacBook Pro, iPad Pro Refresh, and More?

  72. Amazon bolsters Alexa privacy after user trust takes a hit

  73. iOS 13 and iPadOS: Here's everything you need to know

  74. Facebook will have to give UK police access to encrypted messages, report says

  75. 35 Clever Hacks That'll Save You Money, Time, And Tears

  76. Top 15 hidden features in iOS 13 that you must check out

  77. Why home security signs could actually get you robbed

  78. External hard drive not working with iPad or iPhone using iPadOS or iOS 13?

  79. Hackers looking into injecting card stealing code on routers, rather than websites | ZDNet

  80. The 30 best films of the decade, ranked

  81. How to choose the right smartphone for you

  82. 'Inside Bill's Brain' Calls BS on Malcolm Gladwell's 'Outliers' Theory

  83. 29 Quotes By Keanu Reeves That Will Give You A Different Perspective On Life

  84. The 11 Best New TV Shows Coming This Fall—From 'Watchmen' to 'Mandalorian'

  85. How to erase your personal information from the internet (it’s not impossible!)

  86. linux cyber security videos - Google Search

  87. Creating and using a live installation image :: Fedora Docs Site

  88. 5 signs your security culture is toxic (and 5 ways to fix it)

  89. All your IoT devices are doomed | ZDNet

  90. NSLOOKUP and How It Works With DNS Records

  91. Move over VPN, SDP has arrived

  92. Azure for Education | Microsoft Azure

  93. American Cyber Command hamstrung Iran’s paramilitary force

  94. Galaxy Note 10's best hidden features

  95. How to Perfectly Customize Every Setting on the New Galaxy Note 10

  96. How To Get the Most Out of Your Smartphone Battery

  97. Large Telecoms, State Enforcers Make Pact to Combat Robocalls

  98. Ransomware Attacks Are Testing Resolve of Cities Across America

  99. Get the most out of the Note 10's camera

  100. Facebook’s First Newsroom Imploded. Now It’s Trying Again.

  101. What Happened to Evasi0n.com? - Picozip

  102. Best electric mountain bike 2019: uphill made easy with E-MTB. Downhill is up to you…

  103. 5 ways Amazon Alexa can entertain your bored self

  104. Kaspersky Antivirus Software Exposed Millions to Web Tracking

  105. Why Letting Red Hat Do Its Thing Was Wise Choice by IBM

  106. Apple Card Review: The Credit Card of the Future Is No Card At All

  107. The Amazon Publishing Juggernaut

  108. Apple reveals special new iPhones for security researchers

  109. The 50 Best TV Shows on Netflix Right Now

  110. College Still Pays Off, but Not for Everyone

  111. We keep falling for phishing emails, and Google just revealed why

  112. Map reveals which cities use Ring's surveillance network to spy on you

  113. Google Warning: Tens Of Millions Of Android Phones Come Preloaded With Dangerous Malware

  114. Getting the best Wi-Fi speeds at home? Check the fine print

  115. Unsubscribe

  116. Three useful, yet neglected, SQL statements

  117. 35 Cheap Things That’ll Help Fix The Small Annoyances In Your Life

  118. Domino’s Pizza delivers a game-changing case to the US Supreme Court

  119. How the Accused Capital One Hacker Stole Reams of Data From the Cloud

  120. A dismal industry: The unsustainable burden of cybersecurity | ZDNet

  121. This hacker will trick you, and you'll be glad she did

  122. FBI, ICE find state driver’s license photos are a gold mine for facial-recognition searches

  123. Wi-Fi 6 is fast enough to download 22 Marvel movies in 3 hours

  124. Capital One looked to the cloud for security. But its own firewall couldn’t stop a hacker.

  125. Google's New Gesture Controls Aren't Just for the Pixel

  126. Apple put an iPhone in everybody's pocket — now its growth depends on putting devices all over our bodies

  127. The Alleged Capital One Hacker Didn't Cover Her Tracks

  128. Seattle woman charged in Capital One breach may have data from other companies

  129. An Operating System Bug Exposes 200 Million Critical Devices

  130. Researchers to launch intentionally ‘vulnerable’ blockchain at Black Hat

  131. What's a smart contract (and how does it work)?

  132. Websites using Facebook 'Like' button liable for data, Europe's top court decides

  133. Upcoming iPhone update will change how you browse online

  134. Should You Use a VPN for Internet Privacy? That Depends, Experts Say

  135. How To Make Sure Websites Aren’t Spying On You: Guide To Three Popular Browsers | Def Pen

  136. Plex makes piracy just another streaming service

  137. The Amazon dilemma: how a tech powerhouse that fulfills our every consumer need still lets us down

  138. 5 Ways Reading Can Change Your Life (and Best Practices)

  139. IT’s soft skills shortage — and how to train up for success

  140. Getting help for Linux shell built-ins

  141. Banner vulnerability allows remote access to records of more than 60 colleges | SC Media

  142. No More Ransom project has prevented ransomware profits of at least $108 million | ZDNet

  143. 15 extremely useful Gmail shortcuts you'll want to know

  144. How to efficiently charge your devices

  145. Fix your phone's horrible signal strength

  146. Electronic Recycling Guide

  147. Watch Out for This Amazon Prime Day Scam

  148. Why are people so hostile towards President Donald Trump? - Quora

  149. Facebook now shows you who uploaded and shared your information for other advertisers to target you

  150. Which smart speaker is perfect for you?

  151. More than 1,000 Android apps harvest data even after you deny permissions

  152. How to Protect Our Kids' Data and Privacy

  153. Sunday Night Is the New Monday Morning, and Workers Are Miserable

  154. Trick those #!@% spam calls with a fake phone number

  155. Perspective | All eight Spider-Man movies, ranked from worst to best

  156. A Costly Reminder That You Don't Own Those Ebooks

  157. How a trivial cell phone hack is ruining lives

  158. If you can only buy one, should it be the MacBook Pro or the iPad Pro?

  159. A hacker assault left mobile carriers open to network shutdown

  160. Quantum computers will break today's internet security. This work could help fix it

  161. The best programming language to learn

  162. EU-US Privacy Shield legal showdown now set for July 9 – TechCrunch

  163. Samsung’s deepfake technology is getting scary

  164. This Reddit Thread Of "Guy Secrets" Is Equal Parts Hilarious And Heartfelt

  165. Review | Google Chrome has become surveillance software. It’s time to switch.

  166. Warning Issued For Apple's 1.4 Billion iPad And iPhone Users

  167. Samsung Galaxy Note 10 could have a new laptop-thrashing trick up its sleeve

  168. The best and worst of smart home tech for one injured vet

  169. International Dark Sky Places

  170. You're Probably Doing 2FA Wrong: Here's the Right Way

  171. Robin Williams hilarious interview

  172. AWS chief says facial recognition should be regulated

  173. You can now use your Android phone as a 2FA security key for Google accounts on iOS

  174. Apple: iPad's now the best PC for more people

  175. Inside the farm of the future

  176. What’s the best iPad Pro keyboard?

  177. How one romance scammer built an international phishing operation | ZDNet

  178. Much @Stake: The Band of Hackers That Defined an Era

  179. Apple finally kills off iTunes

  180. If China Really Wants to Retaliate, It Will Target Apple

  181. This ID Scanner Company is Collecting Sensitive Data on Millions of Bargoers

  182. All the Ways Google Tracks You—And How to Stop It

  183. Newly Released Amazon Patent Shows Just How Much Creepier Alexa Can Get

  184. Perspective | It’s the middle of the night. Do you know who your iPhone is talking to?

  185. Why I (Still) Love Tech: In Defense of a Difficult Industry — WIRED

  186. Google Is Making Android As Difficult To Hack As iPhone—And Cops Are Suffering

  187. Amazon Prime Video Channels: Everything you need to know

  188. Samsung deepfake AI could fabricate a video clip of you from a single photo

  189. Political Parties Still Have Cybersecurity Hygiene Problems

  190. Remember Google keeps a list of everything you buy – and here's how to find it

  191. How Tech Companies Are Shaping the Rules Governing AI

  192. How to use Google Maps to help someone find you

  193. Want one of the best paid entry-level jobs? Learn this 20-year-old programming language | ZDNet

  194. Perspectives: We're getting closer to stopping tech giants like Apple from abusing their power

  195. The One Password Tip Everyone Needs to Know

  196. San Francisco becomes first city to bar police from using facial recognition

  197. What is phishing? How this cyber attack works and how to prevent it

  198. Keanu Reeves Leaves Colbert Speechless With An Incredible Reflection On Death

  199. How to ditch your iPhone for Android—and take your files with you

  200. Wi-Fi 6: Better, faster and... kind of like Goro from Mortal Kombat?

  201. Limit How Long Google Keeps Your Data With This Overdue Setting

  202. Hands On With Google's Nest Hub Max Smart Display

  203. Hey, Google, let's drive: How you'll use the new Assistant Driving Mode for Android phones

  204. Google brings AR and Lens closer to the future of search

  205. Google’s next-gen Assistant is 10x faster and knows where your mom lives

  206. 9 Apps You Should Have on Your iPhone

  207. What Amazon knows about you

  208. When Coding Is Criminal

  209. Chinese humanoid robot turns on the charm in Shanghai

  210. Facebook has told federal investigators it’s open to heightened oversight of its privacy practices

  211. Facebook Building Cryptocurrency-Based Payments System

  212. Facebook

  213. The stupid reason Apple is using to try to stop you from fixing your own iPhone | ZDNet

  214. Google Pixel 3 owners are still facing problems 6 months later, here’s the list

  215. Google adds way to auto-delete your location history, web activity

  216. Pickup-bicycle collision on UT road raises broad liability issues

  217. NSA asks to end mass phone surveillance

  218. There's nothing funny about today's marijuana. It killed my son

  219. Amazon Prime two-day shipping will go down to one day

  220. The WIRED Guide to Open Source Software

  221. Coming to store shelves: cameras that guess your age and sex

  222. How Nest, designed to keep intruders out of people’s homes, effectively allowed hackers to get in

  223. Apple 'plotted' to hurt Qualcomm years before it sued the company

  224. Facebook’s privacy woes have a price tag: $3 billion or more

  225. Assume breach is for losers: These steps will stop data breaches

  226. NY Cyber Fellowship | NYU Tandon School of Engineering

  227. How New York City plans to become a cybersecurity hub

  228. 3 things about cloud and IoT you need to consider

  229. The 9 Best Macintosh WYSIWYG Editors

  230. AT&T’s 5G E marketing ploy is turning out to be a disaster

  231. Don't Praise the Sri Lankan Government for Blocking Facebook

  232. A 'Blockchain Bandit' Is Guessing Private Keys and Scoring Millions

  233. Amazon opens Key delivery to garages – TechCrunch

  234. Opinion | The Only Answer Is Less Internet

  235. Facebook leaks: Zuckerberg turned data into dollars in ruthless battle with competitors

  236. Samsung Delays Launch Of $2,000 Folding Phone After Reviewers Find Broken Screens

  237. Galaxy Note 10: Rumors, price, release date, specs and everything else

  238. How to Maximize Your Kindle’s Battery (and Really Get a Month of Reading)

  239. Facebook really doesn't seem to understand privacy or security

  240. Cyberspies Hijacked the Internet Domains of Entire Countries

  241. Walmart and Google forge voice order alliance to battle Amazon | ZDNet

  242. End of an era: Soon smart speakers will outnumber tablets | ZDNet

  243. People Wearing AirPods Are Making Things Awkward For Everyone Else

  244. How to remap Bixby to Google Assistant on the Samsung Galaxy S10, Note 9, and other One UI devices

  245. Samsung's Galaxy Fold Phones Are Already Breaking

  246. The Coming Obsolescence of Animal Meat

  247. j.mp/drippler_app

  248. Google’s hybrid cloud platform is coming to AWS and Azure

  249. In a world of Google and Amazon, libraries rethink their role

  250. Report: Samsung will release four Galaxy Note 10 models, both 4G and 5G options

  251. Robots, VR and 3D printers are served up at this high-tech library

  252. Einstein's theory was put to the test. Guess what happened

  253. Review | Die, robocalls, die: A how-to guide to stop spammers and exact revenge

  254. Is More Knowledge Making Us Less Reasonable?

  255. The Day the Dinosaurs Died

  256. Change is not difficult. We make it difficult

  257. Old, Online, And Fed On Lies: How An Aging Population Will Reshape The Internet

  258. Profiting Off The Explosive Growth In Artificial Intelligence And Robotic Automation

  259. Amazon’s Rise in Ad Searches Dents Google’s Dominance

  260. Tenants worry smart-home tech could be abused by landlords

  261. r/cvsreceipts

  262. Reap the Promise of One and Done Authentication With SSO

  263. Trends in the Information Technology sector

  264. 38 Gmail Tips That Will Help You Conquer Email

  265. One week with Apple News Plus: a messy but good-enough Netflix for magazines

  266. Mark Zuckerberg says Facebook may pay publishers to put their stuff in a dedicated news section

  267. South Korean websites hit with rare waterhole phishing scheme | SC Media

  268. Watch every Marvel movie *and* show in the perfect order

  269. 4 obstacles to ethical AI (and how to address them)

  270. Read the latest headlines in the Apple News app

  271. The secret tricks Apple store staff use to push certain products | ZDNet

  272. Steven Spielberg's push against Netflix at Oscars hits nerve

  273. 3 things you must include in an IoT security plan

  274. Verizon Pledges Home Internet on Its 5G Rollout

  275. Why are TVs so cheap now? Well, your smart TV is watching you and making extra money, too

  276. Samsung’s One UI is the best software it’s ever put on a smartphone

  277. Apple just made it easier to find and manage subscriptions in iOS

  278. Here's the One Gmail Setting You Should Activate Now

  279. How to stay as private as possible on Apple's iPad and iPhone

  280. With Magic Leap, your entertainment may get real weird real quick

  281. The Linux command-line cheat sheet

  282. The Next 7 Steps in Convergence of Technology, Business—and Humanity

  283. Google's Making It Easier to Encrypt Even Cheap Android Phones

  284. Phishing emails imitate American banks to infect victims with TrickBot

  285. Tech Is Splitting the U.S. Work Force in Two

  286. Why cloud computing suddenly seems so hard and expensive

  287. Coming soon: On-premises 5G gear for enterprises

  288. Prepping the Enterprise for the AI Apocalypse - InformationWeek

  289. Amazon Eases Into Self-Driving Tech By Joining Aurora's $530 Million Funding Surge

  290. iPhone 7, iPhone 8 being modified for German market following Qualcomm patent trial win

  291. How to get more from Terminal and use it to control your Mac

  292. Why CAPTCHAs have gotten so difficult

  293. Microsoft CEO Says Privacy a Basic Human Right, Calls for Global GDPR

  294. Tesla to buy energy tech company Maxwell Technologies for about $218 million

  295. A New Google Chrome Extension Will Detect Your Unsafe Passwords

  296. Apple, the iPhone, and the Innovator’s Dilemma

  297. Google’s new Android apps listen to the world for the hard of hearing

  298. Why is Java programming popular for businesses?

  299. Top Tech Trends In 2019: 11 Experts Detail What You Need To Watch

  300. 10 cybersecurity trends to watch for 2019

  301. Abstinence-Only Sex Education Has A Big Unintended Consequence In Conservative States

  302. $145 million funds frozen after death of cryptocurrency exchange admin | ZDNet

  303. This password-stealing phishing attack comes disguised as a fake meeting request from the boss | ZDNet

  304. The Ten Most Ridiculous Things "On the Blockchain"

  305. Met Police deploys live facial recognition technology for ninth time

  306. Six Trends for 2019 That Will Redefine Enterprise Tech

  307. Where’s Apple’s collaboration service?

  308. How to run a successful IT internship program

  309. Opinion | Unless You’re Oprah, ‘Be Yourself’ Is Terrible Advice.

  310. How to Rearrange the Menu Bar on the Mac - TekRevue

  311. The autonomous vehicle parking problem

  312. What to expect from tomorrow’s big net neutrality court hearing


  1. Russian hackers modify Chrome and Firefox to track secure web traffic

  2. Google launches leaked-password checker, will bake it into Chrome in December

  3. Rethinking Cyberisks amid a rapidly evolving threat environment | SC Media

  4. How Can I Find Out If Someone’s Stealing My Wifi?

  5. Technology and social change: How government CIOs can improve outcomes for citizens and society | ZDNet

  6. The four big US carriers want to help you get rid of passwords, but you’ll have to wait

  7. Linux to get kernel 'lockdown' feature | ZDNet

  8. Malware that can't be detected by Windows Defender is spreading by the thousands - MSPoweruser

  9. New SIM Card Attacks: Both Android And iOS Impacted—Are You Vulnerable?

  10. Amazon may soon be able to track your phone’s location even if you don’t use any of its products or services

  11. Apple Issues New Warning For Millions Of iPhone Users

  12. You Need a Password Manager. Here Are the Best Ones

  13. Unfixable Exploit Is the Latest Apple Security Upheaval

  14. Google Draws House Antitrust Scrutiny of Internet Protocol

  15. To use Alexa, you have to trust Amazon

  16. What a security career will look like in five years

  17. 'Right to be forgotten' by Google doesn't apply worldwide, Europe's top court rules

  18. The top 5 email encryption tools: More capable, better integrated

  19. 10 signs you're being socially engineered

  20. My Surprising Career as an Amazon.com "Fake" Reviewer | Anonymous

  21. Millions of medical records exposed online | SC Media

  22. In cybersecurity speed kills, but faster saves | SC Media

  23. Gamification: A winning strategy for cybersecurity training | SC Media

  24. Ransomware: 11 steps you should take to protect against disaster | ZDNet

  25. The ransomware crisis is going to get a lot worse | ZDNet

  26. The Air Force Will Let Hackers Try to Hijack an Orbiting Satellite

  27. 'Simjacker' Attack Can Track Phones Just by Sending a Text

  28. LastPass bug leaks credentials from previous site | ZDNet

  29. Sidewalk Labs' controversial data collection project is now a company

  30. Google collects face data now. Here's what it means and how to opt out

  31. Crypto-Gram: September 15, 2019 - Schneier on Security

  32. 2fa explained: How to enable it and how it works

  33. Wave goodbye to passwords: Soon you could unlock your PC just by holding up your hand | ZDNet

  34. US Govt. plant USB sticks in security study, 60% of subjects take the bait

  35. Google Finally Confirms Security Problem For 1.5 Billion Gmail And Calendar Users

  36. How to Delete Online Accounts You No Longer Need

  37. Wipe Data From Your Car Before Selling It

  38. The zero trust model explained | SC Media

  39. Facebook will no longer scan user faces by default

  40. Forget email: Scammers use CEO voice 'deepfakes' to con workers into wiring cash | ZDNet

  41. Cyberwar: The Complete Guide

  42. Face It -- Biometrics To Be Big In Cybersecurity

  43. The World's First Cyber Crime: The Morris Worm [KERNEL PANIC]

  44. The Myth of Consumer-Grade Security - Schneier on Security

  45. More than 400 police forces working with Ring to view doorbell cam footage

  46. Capital One hack shows difficulty of defending against irrational cybercriminals

  47. Microsoft: Using multi-factor authentication blocks 99.9% of account hacks | ZDNet

  48. Examining and addressing threat detection and response challenges

  49. The bogus-check scam is back, in the form of a car-wrap offer

  50. The most stressful aspects of being a cybersecurity professional

  51. 10 Best Password Manager Apps (2019 Updated) | Drippler - Apps, Games, News, Updates & Accessories

  52. The growing backlash against facial recognition tech

  53. Hackers Found a Freaky New Way to Kill Your Car

  54. Check your access control permissions before hackers do

  55. DNS hijacking campaign targets national security organizations

  56. Microsoft Office now the most targeted platform, as browser security improves

  57. Opinion | We Built an ‘Unbelievable’ (but Legal) Facial Recognition Machine

  58. Wipro clients hit after firm falls for phishing attack | SC Media

  59. Data on Thousands of Law Enforcement Personnel Exposed in Breach

  60. Is Using Public WiFi Still a Bad Idea?

  61. Tracking Phones, Google Is a Dragnet for the Police

  62. Future-proof cybersecurity: Addressing implementation challenges in quantum cryptography | SC Media

  63. Crypto-Gram: April 15, 2019 - Schneier on Security

  64. Use Your Android Phone as a Security Key for Signing into Websites

  65. Inside an Epic Hotel Room Hacking Spree

  66. Incognito mode won’t keep your browsing private. Do this instead

  67. Google Offers Built-In Security Key Feature for Android Phones

  68. Three lessons from the top cybersecurity threats of 2018 | SC Media

  69. How to Fight the Threat of USB Thumb Drives

  70. Call to delay use of Police Scotland data devices

  71. Facial recognition can speed you through airport security, but there's a cost

  72. How the EverCrypt Library Creates Hacker-Proof Cryptography | Quanta Magazine

  73. Facial recognition raises real ethical questions

  74. What Sony's robot dog teaches us about biometric data privacy

  75. Insurance Companies collaborate to offer Cybersecurity ratings | SC Media

  76. How to Protect Your Enterprise PCs Against Fake Updates

  77. Why 2019 will prove biometrics aren’t a security “silver bullet” | SC Media

  78. Crypto-Gram: March 15, 2019 - Schneier on Security

  79. Amex, Netflix customers targeted in phishing campaign | SC Media

  80. Here's how to view, download, and delete your personal information online

  81. Facebook Stored Millions of Passwords in Plaintext—Change Yours Now

  82. Facial recognition: Apple, Amazon, Google and the race for your face

  83. Locking More Than the Doors as Cars Become Computers on Wheels

  84. US Government Forging Ahead With Airport Facial Recognition Plans | Transportation | TechNewsWorld

  85. The Five Most Dangerous New Attack Techniques

  86. Will PSD2 Finally Kill The Password? | SC Media

  87. These are the 12 most common phishing email subject lines cyber criminals use to fool you | ZDNet

  88. 3 ways to monitor encrypted network traffic for malicious activity

  89. Phishing attacks: Half of organisations have fallen victim in last two years | ZDNet

  90. The NSA Makes Its Powerful Cybersecurity Tool Open Source

  91. Are employees the weakest (cybersecurity) link? Sometimes | SC Media

  92. Linux servers targeted by new Chinese crypto-mining group | ZDNet

  93. Fool ML once, shame on you. Fool ML twice, shame on... the AI dev? If you can hoodwink one model, you may be able to trick many more

  94. Microsoft wants to use blockchain to secure your identity

  95. Hackers Can Slip Invisible Malware into Some Cloud Computers

  96. NATO Group Catfished Soldiers to Prove a Point About Privacy

  97. Password manager flaws can expose data on compromised devices, report says | SC Media

  98. Using the zero trust model to prevent phishing | SC Media

  99. Explainer: What is quantum communication?

  100. The Wired Guide to Your Personal Data (and Who Is Using It)

  101. What is a man-in-the-middle attack? How MitM attacks work and how to prevent them

  102. What is phishing? How this cyber attack works and how to prevent it

  103. Scammer groups are exploiting Gmail 'dot accounts' for online fraud | ZDNet

  104. Major DNA testing company is sharing genetic data with the FBI

  105. Your digital identity has three layers, and you can only protect one of them

  106. Why Data Privacy Is About More Than Just Security

  107. Phishing attacks posing as missed voicemails nab credentials | SC Media

  108. What is a supply chain attack? Why you should be wary of third-party providers

  109. How WhatsApp Merger With Facebook Messenger Puts Your Privacy At Risk

  110. 12 Simple Things You Can Do to Be More Secure Online

  111. How Enterprises Need to Handle Today’s Threat Landscape

  112. Why Quantum-Resistant Encryption Needs Quantum Key Distribution for Real Security

  113. What is spear phishing? Why targeted email attacks are so difficult to stop

  114. Why Enterprises Need to Crack Down on Lazy Logins

  115. Why Marriott Breach Includes Some Valuable IT Lessons

  116. Data breaches can sucker-punch you. Prepare to fight back

  117. Marriott breach exposes more than just customer info | SC Media

  118. Hackers target Dell customer information

  119. Lawmakers call for data security legislation in wake of Marriott breach

  120. Cybercrime and cyberwar: A spotter's guide to the groups that are out to get you | ZDNet

  121. Cyberwar predictions for 2019: The stakes have been raised | ZDNet

  122. Survey shows IT professionals concerned about cyberwarfare, end users, and conducting international business | ZDNet

  123. Little FYI: Wi-Fi calling services on AT&T, T-Mobile US, Verizon are insecure, say boffins

  124. Mobile Phone Security: All You Need to Know | Cybersecurity | TechNewsWorld

  125. Be Warned: Customer Service Agents Can See What You're Typing in Real Time

  126. New cryptominer seeks out root permissions on Linux machines | SC Media

  127. The FBI Created a Fake FedEx Website to Unmask a Cybercriminal

  128. USPS fixes 'Informed Delivery' flaw that exposed 60M users | SC Media

  129. Career advice: Good enough security trumps best security

  130. Surveillance Kills Freedom By Killing Experimentation

  131. IRS Issues Urgent Warning On Tax Transcript Scam

  132. What network pros need to know about IoT

  133. Utilizing the Human Element to Mitigate Today’s Sophisticated Cyber Threat Landscape

  134. Crypto-Gram: November 15, 2018 - Schneier on Security

  135. With $20 of Gear from Amazon, Nearly Anyone Can Make This IMSI-Catcher in 30 Minutes

  136. Apache Struts vulnerability would allow system take over | SC Media

  137. Worst malware and threat actors of 2018 so far

  138. National biometric database could be on the way (and in private hands) | ZDNet

  139. Hackers are increasingly destroying logs to hide attacks | ZDNet

  140. Mobile device security: A guide for business leaders - Tech Pro Research

  141. How to keep your data secure and private, step by step

  142. ​The day computer security turned real: The Morris Worm turns 30 | ZDNet

  143. Cyber threats fueled by AI: Security's next big challenge

  144. DDoS and ransomware tools for starter and experienced cybercriminals exposed | SC Media

  145. Thieves steal a Tesla Model S by hacking the entry fob

  146. Free decryption tool released for multiple GandCrab ransomware versions | ZDNet

  147. Most consumers have cyber security concerns, but a fraction take action | ZDNet

  148. Create an Alias For Your iCloud Address to Maintain Your Online Privacy

  149. Tim Cooks warns of ‘data-industrial complex’ in call for comprehensive US privacy laws

  150. Latest Firefox takes aim at tracking cookies and promotes the use of VPN

  151. Every minute for three months, GM secretly gathered data on 90,000 drivers' radio-listening habits and locations

  152. U.S. Begins First Cyberoperation Against Russia Aimed at Protecting Elections

  153. Six tips to stop phishing attacks | SC Media

  154. Securing Middle America: small towns more at risk of ransomware, phishing and more | SC Media

  155. 3 top multi-cloud security challenges, and how to build a strategy

  156. Facebook reportedly aims to buy a 'major' cybersecurity company

  157. 5 reasons eSignatures are the must-have tool you don't think about

  158. How to Stay Anonymous Online | Digital Trends

  159. 17 penetration testing tools the pros use

  160. Securing risky network ports

  161. Why CISOs Fumble With Understanding Security Needs

  162. Why Supply Chain Security a Serious Enterprise Problem

  163. Expanding attack surfaces and difficulties obtaining the right people worry NCSA panelists | SC Media

  164. Despite proposed solutions, DNS security issues remain in tech industry

  165. Crypto-Gram: October 15, 2018 - Schneier on Security

  166. 'Flash update' scam serves up legit software, but with a side of cryptominer | SC Media | SC Media

  167. Ransomware hits Madison County Idaho government | SC Media | SC Media

  168. It Only Took 9 Seconds to Guess a DOD Weapons System Password

  169. What is IAM? Identity and access management explained

  170. Apple, Amazon deny servers affected by China microchip plot | SC Media

  171. Five Trends in Attacks on Industrial Control Systems

  172. Apple, Amazon deny report that Chinese spy chips infiltrated their hardware

  173. China Used a Tiny Chip in a Hack That Infiltrated Amazon and Apple

  174. Digital IDs Are More Dangerous Than You Think

  175. Security News This Week: The Feds Can't Force Facebook to Wiretap Messenger

  176. Quantum computers could break encryption, so it’s going quantum too

  177. Everything We Know About Facebook's Massive Security Breach

  178. 5 biggest cybersecurity challenges at smaller organizations

  179. Trump's Immigration Cops Just Gave America's Hottest iPhone Hackers Their Biggest Payday Yet

  180. Four Security Questions Healthcare Organizations Must Address When Moving to the Cloud | SC Media

  181. Mobile Carriers Join Together for Project Verify Authentication Effort

  182. Five security settings in iOS 12 you should change right now

  183. What is Zero Trust? A model for more effective security

  184. Crypto-Gram: September 15, 2018 - Schneier on Security

  185. You'll never guess what you can do once you steal a laptop, reflash the BIOS, and reboot it

  186. A Decade-Old Attack Can Break the Encryption of Most PCs

  187. For safety’s sake, we must slow innovation in internet-connected things

  188. 6 ways companies fail at security fundamentals

  189. How to Send a Secret Image in Plain Sight

  190. Facebook launches Clear History feature that should have been there all along | ZDNet

  191. Mark Zuckerberg Says It Will Take 3 Years to Fix Facebook

  192. Everything Facebook Announced Today at F8

  193. Cyber security: Don't leave it to your tech team or you'll get breached, warns data protection chief | ZDNet

  194. Private web browsing doesn’t mean no one is watching

  195. Worse Than Y2K: Quantum Computing And The End Of Privacy

  196. Nine Best Practices for Keeping Bad Actors Out of a Database

  197. Crypto-Gram: April 15, 2018 - Schneier on Security

  198. The One Router Setting Everyone Should Change (But No One Does)

  199. How quantum computing could wreak havoc on cryptocurrency

  200. DNS Security with DNSCrypt | OpenDNS

  201. Amazon Advances Cloud Security, Storage Tools at AWS Summit

  202. How to Create Secure Passwords That Aren't Impossible to Type

  203. How to use Cloudflare's DNS service to speed up and secure your internet | ZDNet

  204. 10 Ways to tell if that email is legitimate...or not

  205. Are you ready? This is all the data Facebook and Google have on you | Dylan Curran

  206. StumbleUpon

  207. GitHub Survived the Biggest DDoS Attack Ever Recorded

  208. FBI's Use of Paid Best Buy Informants Goes Deeper Than We Knew

  209. IT pros don't learn from cyberattacks, study

  210. Apple App Store Scam Stealing Credit Cards: What to Do

  211. FTC warning users to do homework before using VPN apps

  212. DoubleDoor Botnet Chains Exploits to Bypass Firewalls

  213. Study shows which phishing attacks most successful

  214. Microsoft is trying to kill passwords. It can't happen soon enough

  215. Add a PIN to Your Smartphone Account

  216. Why Linux is better than Windows or macOS for security

  217. Improving Cyber-Security Hygiene: Nine Methods to Fight Off Intruders

  218. Many businesses still using outdated security, says Troy Hunt

  219. Your Sloppy Bitcoin Drug Deals Will Haunt You for Years

  220. What Is Bitcoin, and How Does it Work?

  221. How does Bitcoin work? - Bitcoin

  222. New to Bitcoin?

  223. Best Password Managers 2018

  224. The Best VPN Services and Apps of 2018

  225. To Improve Cybersecurity, Start with Improving Human Behavior

  226. Watch a 10-Year-Old's Face Unlock His Mom's iPhone X

  227. Cybersecurity is dead – long live cyber awareness

  228. Google: Our hunt for hackers reveals phishing is far deadlier than data breaches | ZDNet

  229. Update Your Tor Browser to Prevent It From Leaking Your Real IP Address

  230. Know the risks of Amazon Alexa and Google Home

  231. 7 steps for crafting the perfect password

  232. T-Mobile Alerted ‘A Few Hundred Customers’ Targeted By Hackers

  233. Phishing Attacks: Which Departments Are Most at Risk?

  234. KRACK Attack Hacks All Wi-Fi Networks: What to Do

  235. How to Secure Your (Easily Hackable) Smart Home

  236. Security experts air concerns over hackers using AI and machine learning for phishing attacks

  237. Intelligence Experts Say Cyber-Thieves, Nation-State Hackers Teaming Up

  238. Cleartext passwords, and worse found among top 21 financial trading apps

  239. Equifax's disastrous Struts patching blunder: THOUSANDS of other orgs did it too

  240. Quantum Computing Poses Risks to Cryptography and Bitcoin

  241. DDoS protection, mitigation and defense: 7 essential tips

  242. Must-have Wi-Fi troubleshooting and management tools

  243. BlueBorne Bluetooth Flaws Put Billions of Devices at Risk

  244. Discovery Channel - The Secret History Of Hacking

  245. What’s the Difference Between a Fraud Alert, Security Freeze and Credit Lock?

  246. New Social Security Scam Targets Benefit Check Recipients

  247. Equifax breach: How to protect yourself

  248. Top secret data on former U.S. military personnel exposed on Amazon S3 repository

  249. Data breach exposes about 4 million Time Warner customer records

  250. Google Removes Malicious WireX DDoS Botnet Apps from Play Store

  251. Hacking Retail Gift Cards Remains Scarily Easy

  252. If Your Email Address Is On This List, Change Your Password Right Now

  253. TunnelBear: Secure VPN Service

  254. WannaCry Helps Push Cyber-Crime Attacks to New Heights in 2Q17

  255. Fuzzing Analysis Shows ICS, IoT Industries Most at Risk of Zero Days

  256. The Very Best Hacks From Black Hat and Defcon

  257. An Obscure App Flaw Creates Backdoors In Millions of Smartphones

  258. The Best VPN Services

  259. Galaxy S8 face recognition already defeated with a simple picture

  260. Private Internet Access, a VPN provider, takes out a full page ad in The New York Time calling out 50 senators.

  261. Here's how to wipe your old iPad/iPhone/iPod touch ready for resale | ZDNet

  262. A hacker explains why Trump using his old Android phone for Twitter could be a huge security threat

  263. For True Cyber Security, Using a USB Firewall Is Essential

  264. Say Hello to the Super-Stealthy Malware That’s Going Mainstream

  265. Abbrase - Abbreviated Passphrase Password Generator - Darknet

  266. Here's how protect your privacy from hackers and spies

  267. Sophisticated Phishing: Beware the Latest Gmail Phishing Attack | NewsFactor Network

  268. Hardening the Linux server

  269. 20 Linux Server Hardening Security Tips

  270. How to See Everything Your Browser Knows About You

  271. Online Security Made Easy

  272. This $5 Device Can Hack Your Locked Computer In One Minute

  273. Chinese company installed secret backdoor on hundreds of thousands of phones

  274. Beware, iPhone Users: Fake Retail Apps Are Surging Before Holidays

  275. Online Threats Still Rising as Mobile Malware Subsides: Kaspersky

  276. This evil office printer hijacks your cellphone connection

  277. After You Strengthen Your Passwords, Here’s How to Store Them

  278. Trending Mobile VPN Technologies That You Know Of - Information Security Buzz

  279. Information security set for steep trajectory, says (ISC)2

  280. Ethical Hacking Tutorials, Tips and Tricks

  281. Hacksplaining: Learn to Hack

  282. Internet Providers Could Be the Key to Securing All the IoT Devices Already out There

  283. Google's AI created its own form of encryption

  284. Forget the Touch Bar. The MacBook Pro’s Most Important New Feature Is Touch ID

  285. Better safe than sorry: 5 apps for encrypting and shredding files

  286. Attackers Hiding Stolen Credit Card Numbers in Images

  287. Federal Regulators Want Banks to Follow Better Cybersecurity Practices

  288. Crash: how computers are setting us up for disaster | Tim Harford

  289. No endgame for cyber security, says Mikko Hypponen

  290. 10 Tips for Identifying and Dealing With Phishing Email

  291. Tech Support Scams Evolve to Target Broader Range of Users

  292. Microsoft: Tech Support Scams Hit Two-Thirds of Consumers

  293. Hacking demo(messing with loud neighbors) - YouTube

  294. Feds Walk Into A Building. Demand Everyone's Fingerprints To Open Phones

  295. How a chunk of the web disappeared this week: GlobalSign's global HTTPS snafu explained

  296. Remove ransomware infections from your PC using these free tools | ZDNet

  297. Artificial intelligence-powered malware is coming, and it's going to be terrifying

  298. Rethinking Data Protection, Recovery in a Multi-Cloud World

  299. This Hacked Kids’ Toy Opens Garage Doors in Seconds

  300. Lack of IoT Security Is Huge Risk for Critical Enterprise IT Systems

  301. If you've ever created a Yahoo account, take these steps immediately to protect your data

  302. Yahoo under fire over data breach affecting 500 million users

  303. Security News: Cyber, IT, National Security | WIRED

  304. Cloud computing: Four reasons why companies are choosing public over private or hybrid clouds | ZDNet

  305. Dropbox Breach Exposes 68 Million Passwords

  306. Create a Strong Password Using These Tips and Tools

  307. LastPass Authenticator Two-Factor App Launch

  308. FedEx: Amazon would have to spend 'tens of billions' to compete with us

  309. 10 Great Security Tools You Should Be Using

  310. A Journey in the Life of an Encrypted Email

  311. 9 Facts About Computer Security That Experts Wish You Knew

  312. P0wned plug-in puts a million WordPress sites at risk of attack

  313. Why Security Awareness Alone Won't Stop Hackers

  314. The Top 8 Mobile Security Risks: How to Protect Your Organization

  315. 10 Security Apps to Help Your Android Device Fend Off Malware

  316. Schneier on Security: My Conversation with Edward Snowden

  317. Schneier on Security: January 15, 2015

  318. The Five Best Password Managers

  319. LastPass releases Open Source command line client • The Register

  320. Planning Considerations for BYOD and Consumerization of IT (Part 6)

  321. How To Use John The Ripper To Crack Passwords-BackTrack Tutorials For Beginners - Learn With Pranshu

  322. How to Tap Your Network and See Everything That Happens On It

  323. How to Hack Your Own Network and Beef Up Its Security with Kali Linux

  324. Google goes beyond two-step verification with new USB Security Key | Naked Security

  325. YubiKey Authentication | LastPass User Manual

  326. Frequently Asked Questions

  327. POODLE attack takes bytes out of your encrypted data – here’s what to do | Naked Security

  328. With This Tiny Box, You Can Anonymize Everything You Do Online | WIRED

  329. The Ultimate Wireshark Tutorial

  330. Apple Pay security: Hope abounds, but questions linger

  331. http://people.redhat.com/duffy/selinux/selinux-coloring-book_A4-Stapled.pdf

  332. The Start-to-Finish Guide to Securing Your Cloud Storage

  333. Google’s Location History is Still Recording Your Every Move

  334. Nearly Half Of Americans Claim They've Changed Their Behavior Due To NSA | Techdirt

  335. The Beginner’s Guide to iptables, the Linux Firewall

  336. Here's Everywhere You Should Enable Two-Factor Authentication Right Now

  337. Introduction to Wireshark (Part 1 of 3)

  338. Following Best Coding Practices Doesn't Always Mean Better Security - Slashdot

  339. Aging networking protocols abused in DDoS attacks - security, Prolexic - Computerworld

  340. The 7 elements of a successful security awareness program - Network World

  341. SANS NewsBites

  342. Supply chain 2013: Stop playing whack-a-mole with security threats - Network World

  343. Schneier on Security: Pinging the Entire Internet

  344. Book Review: The Death of the Internet - Slashdot

  345. Review: OpenPuff steganography tool hides confidential data in plain sight | PCWorld

  346. 15 (FREE!) security tools you should try

  347. We suck at security, study says [infographic] | VentureBeat

  348. Hacker 10 – Security Hacker | Computer security tutorials, encryption and privacy software.

  349. Metasploit Helpful Tips | SOA World Magazine

  350. Dropbox Rolls Out Two-Step Verification; Use It

  351. Android Passwords are stored in plain text on Disk ~ THN : The Hacker News

  352. The 5 Biggest IT Security Mistakes | PCWorld

  353. Cellular network hijacking for fun and profit • The Register

  354. Forget Anonymous: Evidence Suggests GOP Hacked, Stole 2004 Election : politics

  355. Use Lion's FileVault 2 to encrypt your Mac's internal drive | Storage | Macworld

  356. Why you shouldn't trust Google (or any cloud service) with your data | ZDNet

  357. Default Router Passwords - The internets most comprehensive router password database

  358. Beware the All-Powerful Administrator - PCWorld

  359. Security Secrets the Bad Guys Don't Want You to Know

  360. Timeline: The History of Hacking


  1. Microsoft Surface: Saving the future of PCs

  2. Are Dropbox's Paid Plans Worth It?

  3. Dropbox launches Spaces, its ‘smart’ collaboration workspace

  4. Why is Dropbox reinventing itself? – TechCrunch

  5. Why Facebook and Amazon have joined the race to bring computing to your face

  6. As Amazon floods the market with Alexa devices, the business model is getting fresh scrutiny

  7. These are the huge differences between Apple Arcade and Google Play Pass

  8. Amazon's new Echo Frames smart glasses bring Alexa to your face for $180

  9. iOS 13: Apple's big BYOD improvements help enterprise pros

  10. Amazon creates a huge alliance to demand voice assistant compatibility

  11. Kodak Is Ready for an Instant Camera Comeback

  12. The iPad Can Finally Replace a Laptop for Most People

  13. Google is bringing Assistant to people without internet access – TechCrunch

  14. Redesigning business processes for digital success

  15. Hands on with Apple Arcade in iOS 13

  16. Researchers: AI surveillance is expanding worldwide

  17. How Much Would You Spend on Streaming Services Per Month?

  18. Bill Gates Says Big Tech Companies Shouldn’t Be Broken Up

  19. Amazon Music rolls out a lossless streaming tier that Spotify and Apple can’t match

  20. The Shift to Electric Vehicles Propels a Strike Against GM

  21. Google Fi now offers an unlimited plan

  22. Apple as a service: One day you'll rent it all...

  23. Will Samsung kill the Galaxy Note series next year? - SamMobile

  24. Gartner sees blockchain as ‘transformational’ across industries – in 5 to 10 years

  25. Gartner: Get ready for more AI in the workplace

  26. Artificial intelligence today: What’s hype and what’s real?

  27. Walmart takes its $98 Delivery Unlimited service nationwide

  28. Apple exec confirms cryptocurrency is on company radar

  29. The Most Incredible Gadget Apple Plans to Introduce This Fall Is Something You Never Saw Coming (Here's Why It's Brilliant)

  30. Amazon is planning to bring a biometric payment method to Whole Foods

  31. Steve Wozniak says Apple should have broken up years ago

  32. Wi-Fi 6 will double your network's range and triple its speed -- once you upgrade your router, phone, PC, and everything else

  33. Verizon automatically enrolling customers in free robocall-blocking service

  34. 8 technologies that will disrupt business in 2020

  35. Marriott to Expand Its Home-Sharing Business in a Challenge to Airbnb

  36. Restructuring IT for the digital age

  37. What iPhone? Apple's push toward services begins

  38. Smart TVs Are Cheaper Than Ever, and It's Because They're Selling Your Data

  39. Return your Amazon orders to any Kohl's store starting in July

  40. 7 steps to revenue-driven IT

  41. Apple settles with Qualcomm - the 5G iPhone looks more real (u)

  42. Will Apple need to spin out its services business?

  43. 3 signs you’re going overboard with cloud features

  44. 12 ways IT can create business value in 2019

  45. How AI is helping the help desk

  46. Google Needs to Grow Its Cloud Business—Very Carefully

  47. T-Mobile's streaming TV service will include Viacom channels

  48. Walmart partners with Google on voice-enabled grocery shopping

  49. Huawei's Problem Isn't Chinese Backdoors. It's Buggy Software

  50. The emerging 737 MAX scandal, explained

  51. Facebook Charged With Violating Fair Housing Laws

  52. What you should know about serverless computing before you start

  53. McDonald's Bites on Big Data With $300 Million Acquisition

  54. Google appoints an “AI council” to head off controversy, but it proves controversial

  55. Apple event 2019: Apple Card, TV Plus, News Plus, Arcade and everything just announced

  56. XaaS: Making the shift to services-oriented IT

  57. Top IT spending priorities for 2019

  58. Google's Netflix-like Stadia instantly makes it a video game powerhouse

  59. Google unveils Stadia cloud gaming service

  60. Google Spent Years On a Secret New Plan to Attack a $140 Billion Industry. It All Starts Tomorrow

  61. What customer-centric IT really looks like

  62. 4 takeaways from Apple and Qualcomm's big patent fight

  63. Apple dealt legal blow as jury awards Qualcomm $31 million

  64. How a 50-year design came back to haunt Boeing with its troubled 737 Max jet

  65. Here's how New T-Mobile plans to disrupt the current US in-home broadband market — and why it will be successful

  66. Amazon took over the $176 billion market for cloud computing. Now it's using the same playbook in logistics.

  67. Fitbit CEO James Park talks lessons learned from the company’s struggles

  68. Amazon Almost Killed Best Buy. Then, Best Buy Did Something Completely Brilliant

  69. New Wearables Cut Health Care Costs With Better Monitoring

  70. Facebook sues Chinese companies for selling fake accounts

  71. Facebook faces backlash over users' safety phone numbers

  72. No, Data Is Not the New Oil

  73. AT&T Breaks Up Turner, Bulks Up Warner Bros. in Major WarnerMedia Overhaul

  74. WSJ: Amazon to open new US grocery chain separate from Whole Foods

  75. Google looks to leave passwords behind for a billion Android devices

  76. Walmart Joins Amazon in Chase for Ad Dollars

  77. J.P. Morgan to launch a U.S. dollar-backed cryptocurrency

  78. Microsoft Wants Part Of This $180-Billion Industry

  79. AI, machine learning, and deep learning: The complete guide

  80. AR and VR bring a new twist to collaboration

  81. Information Technology Outsourcing Market (ITO) report for 2019 made available by top research firm

  82. Amazon Gobbles Up Eero to Round Out Its Smart Home Plan

  83. FDA approves AI-powered diagnostic that doesn’t need a doctor’s help

  84. T-Mobile/Sprint merger turns two disruptors into one “mega company,” Dems warn

  85. Maybe Ron Johnson Was Right About J.C. Penney After All -- The Motley Fool

  86. IoT for retailers: opportunities and challenges

  87. IBM Buying Open Source Specialist Red Hat for $34 Billion

  88. IBM's acquisition of Red Hat is huge news for the Linux world

  89. Forget Watson, the Red Hat acquisition may be the thing that saves IBM

  90. IBM to acquire Red Hat in deal valued at $34 billion

  91. 5 ways AI is transforming customer experience

  92. How Enterprises Can Help Build Ethical AI Strategies

  93. Amazon's Echo devices get redesign on the way to world domination

  94. Tech Disrupted the World. Who Will Shake up the Next 25 Years?

  95. Fitbit buddies up with Google for better health

  96. How to build a business case for Artificial Intelligence

  97. Sprint and T-Mobile Are Officially Merging, and It's Terrible

  98. T-Mobile, Sprint agree to merge as America's national wireless carriers shrink from 4 to 3

  99. Ford will stop selling most of its cars in North America

  100. Battle between Apple and Microsoft is over | Cult of Mac

  101. Ford to stop selling every car in North America but the Mustang and Focus Active

  102. How Artificial Intelligence Will Revamp Education

  103. Artificial intelligence will wipe out half the banking jobs in a decade, experts say

  104. Car 'subscriptions' could make ownership obsolete

  105. How Artificial Intelligence Is Revolutionizing Business In 2017

  106. Five CIO tips for building an IT strategy in the digital age

  107. The psychological impact of an $11 Facebook subscription

  108. Gartner Worldwide IT Market Report Predicts Fastest Growth in Decade

  109. Developing the right IT strategy - Supporting business strategy with technology

  110. 4 Models Of The Shopping Mall Of The Future

  111. How blockchain will disrupt Google, Apple, Amazon, and Facebook

Cool! / Interesting

  1. Prepare for the Deepfake Era of Web Video

  2. What's Your Favorite News Aggregator or RSS Reader?

  3. What is JavaScript? JavaScript and ECMAScript, explained

  4. Everything Amazon Announced Today, From Speakers to Glasses

  5. The Best Fitness Trackers and Watches for Everyone

  6. Why Your Memory Sucks, and What You Can Do About It

  7. 10 weirdest things your Amazon Echo can do

  8. Edward Snowden in His Own Words: Why I Became a Whistle-Blower

  9. Why France and Germany fear Facebook’s cryptocurrency – and plan to block it

  10. Top 10 file-sharing options: Dropbox, Box, Google Drive, OneDrive and more

  11. Three words for a faster emergency response | what3words

  12. The Best Smart Displays for 2019

  13. What Sci-Fi Can Teach Computer Science About Ethics

  14. Kernel Panic: Inside the World's Worst Cyberattacks

  15. Mathematicians Discover the Perfect Way to Multiply

  16. MicroLED is the first new screen tech in a decade. Can it beat OLED?

  17. Disney Plus will cost $7 a month and launch Nov. 12

  18. What Is 5G?

  19. 3 Reasons Brits Voted For Brexit

  20. Apple News+ has issues, but it's a great deal for casual readers

  21. The danger of “I already pay for Apple News+”

  22. Your Environment Is Cleaner. Your Immune System Has Never Been So Unprepared.

  23. The Most Beautiful Day Hikes In America

  24. Pilot Who Hitched a Ride Saved Lion Air 737 Day Before Deadly Crash

  25. AI Algorithms Are Now Shockingly Good at Doing Science

  26. Foldable phones are about to make the US very jealous

  27. Inside the High-Stakes Race to Make Quantum Computers Work

  28. The 20 Best Places to Go in 2019

  29. Confused By Expiration Dates? You’re Not Alone. Here’s What They Really Mean

  30. Apple's Radical New iPhone Suddenly Takes Shape

  31. The best e-reader you should buy

  32. 10 Breakthrough Technologies 2019, curated by Bill Gates

  33. Today's Companies Have A Technology Adoption Problem, Not An Innovation Problem

  34. Facebook’s promised Clear History privacy tool to launch later this year following delay

  35. Wi-Fi 6, explained: how fast it really is

  36. Do Not Disturb: How I Ditched My Phone and Unbroke My Brain

  37. 15 Moments That Defined Facebook's First 15 Years

  38. 15 Years of Facebook in 4 Charts

  39. What programming languages rule the Internet of Things?

  40. How a Vermont social network became a model for online communities

  41. Super Blood Wolf Moon in Pictures

  42. Tim Cook calls on FTC to let consumers track and delete their personal data

  43. How Ring's Neighbors app is making home security a social thing

  44. 190 universities just launched 600 free online courses. Here’s the full list.

  45. Explainable AI: Peering inside the deep learning black box

  46. 100 Websites That Shaped the Internet as We Know It

  47. Web Founder Launches Inrupt to Improve Internet Privacy

  48. The Birth of Google

  49. Amazon Wants Alexa to Hear Your Whispers and Frustration

  50. Reimagining of Schrödinger's Cat Breaks Quantum Mechanics--and Stumps Physicists

  51. 10 critical points from Zuckerberg’s epic security manifesto

  52. The WIRED Guide to Virtual Reality

  53. Microsoft Translator Uses AI to Break Language Barriers on Smartphones

  54. Here Are the Major New Features Google Added to Gmail Today (and What It Didn't)

  55. Google’s astounding new search tool will answer any question by reading thousands of books

  56. RSS is undead

  57. It's Time For an RSS Revival

  58. SpareFoot Acquires SiteLink to Drive Innovation for the Self-Storage Industry - The SpareFoot Blog

  59. How the iPad Pro with Smart Keyboard totally replaced my Macbook | ZDNet

  60. Augmented Reality Check: Why Businesses are Embracing AR in 2018

  61. Microsoft’s new open source tool lets you bring your own Linux distro to Windows

  62. How IBM Aims to Make AI Commonplace in AppDev, Business

  63. Why Blockchain Will Survive, Even If Bitcoin Doesn’t

  64. The Secret to a High Tech Concierge Medical Office? Data

  65. Why Artificial Intelligence Researchers Should Be More Paranoid

  66. Introducing AMP Stories, a Whole New Way to Read WIRED

  67. The hottest iPhone and Android accessory we’ve covered in 2018 so far is only $37 on Amazon

  68. Muse Auto smartens your car with Alexa

  69. What Is Bitcoin? | Cool History

  70. The Entire History of Bitcoin in a Single Infographic

  71. Should Data Scientists Adhere to a Hippocratic Oath?

  72. The Chrome Extensions We Can't Live Without

  73. Intel wants smart glasses to be a thing

  74. You can now use Alexa to send SMS messages

  75. Best Amazon Alexa Skills 2018 - Top 50 Cool and Useful Things Alexa Can Do

  76. You Need to Deal With Your Digital Legacy Right Now

  77. Facebook Local Might Be the Only Facebook App You Need

  78. StumbleUpon

  79. Twenty Years after His Death, Carl Sagan Is Still Right

  80. A history of hacking and hackers

  81. Here's what happened when 30 high school sophomores gave up their phones for a day

  82. Find Out Which Cognitive Biases Alter Your Perspective

  83. Life-hacking websites you didn’t know existed (10 photos)

  84. The 10 must-have Safari extensions of 2017

  85. The 12 must-have Firefox add-ons of 2017

  86. Google Earth Gets a Huge Redesign with Guided Tours, 3D View, and More

  87. USAFacts

  88. Is Evernote Premium Worth Its Money for You?

  89. Evernote Embraces MacBook Pro's Touch Bar for Faster Note Taking

  90. 15 fascinating facts you probably didn't know about Amazon

  91. The 15 Most Useful Google Apps You Never Knew Existed

  92. The Seven Best Things You Can Do With an Amazon Echo

  93. This Site Shows You Both Sides of Major Controversial Issues

  94. 5 Brilliant Kindle Apps and Sites Every Ebook Lover Needs

  95. The world's smallest USB-C laptop charger—I'm in love

  96. Google Maps lets you save and share favorite places with launch of Lists

  97. Physicists Just Showed That Quantum Entanglement Is a Physical Reality

  98. Top 10 Free Alternatives to Expensive Software

  99. Apple CarPlay: everything you need to know about iOS in the car

  100. Comparing Microsoft's New Surface Book to Apple's MacBook Pro

  101. A Free Open Source Alternative to Microsoft Visio

  102. Massive banks are ripping off Americans. There is finally an alternative.

  103. REVIEW: Google Home is a win (and better than the Amazon Echo)

  104. These Skills Are Hard To Learn But Pay Off For The Rest of Your Life – The Mission

  105. Millennials changing the face of cybersecurity

  106. 10 Powerful Habits That Will Boost Your Intelligence

  107. The real-world uses for virtual reality - BBC News

  108. This Week's Top Downloads

  109. Amazon Launches New Prime Reading Program

  110. QuickSafes.com

  111. The AI disruption wave

  112. How people are using the Amazon Echo: New study reveals surprising patterns

  113. United States set to Hand Over Control of the Internet to ICANN Today

  114. US hands over control of internet on schedule - despite last-ditch protests | ZDNet

  115. Google Allo: Everything you need to know | Drippler - Apps, Games, News, Updates & Accessories

  116. A Gorgeous—and Unsettling—Video of Evolution in Action

  117. Top 10 Places to Download or Stream Movies For Free, Legally

  118. 11 basic Excel tricks that will change your life

  119. The Ultimate Road Trip Has Been Planned By Scientists. THIS Is What It Looks Like

  120. 6 literary classics you should listen to as audiobooks

  121. Three essential coding languages you can learn today

  122. IBM's Watson analyzed all the 'Harry Potter' books and movies — and the results are fascinating

  123. 35 Most Popular Facebook Pages in the Geek World

  124. A Simple Explanation of What Net Neutrality Is All About

  125. See 11 of the Year's Best Wildlife Photographs

  126. How Much Digital Media Can Fit on History's Storage Devices

  127. What’s Up With That: Why Does Sleeping In Just Make Me More Tired?

  128. 6 Websites to Download eBooks For Free and Legally

  129. Offline over the weekend? Read all the tech news you missed here

  130. 10 Best Channels for STEM Education on YouTube

  131. Programming Languages - Hyperpolyglot

  132. Google's New Flight Search Tool Helps You Find The Best Price

  133. Total Knee Replacement: A Patient's Guide | UW Orthopaedics and Sports Medicine, Seattle

  134. Automagic: 4 Dropbox-connected apps that do the work for you | Dropbox for Business blog

  135. Google Translate Now Does Real-Time Voice And Sign Translations On Mobile | TechCrunch

  136. 10 CES Themes Likely to Resonate for Some Time

  137. Viva Las Vegas!

  138. 15 Documentaries About The Internet, Hacking, Startups & Cyberculture [Stuff to Watch]

  139. What File System Should I Use for My USB Drive?

  140. Internet Archive: Digital Library of Free Books, Movies, Music & Wayback Machine

  141. Best Computer Monitors: October 2014 - Best Monitors For The Money

  142. What You Should Know About the Amazon Kindle Voyage

  143. Most Popular Place to Buy Computer Parts: Newegg

  144. Plastc wants to replace your entire wallet with a single card

  145. Logitech K480 Multi-Devices Bluetooth Keyboard

  146. 50 Little-Known Ways Google Docs Can Help In Education | Edudemic

  147. Amazon.com: Business Analysis: Best Practices for Success (IIL/Wiley Series in Business Analysis) eBook: Steven Blais: Kindle Store

  148. Mozilla launches Open Badges 1.0, delivers virtual kudos for real skills

  149. Visual Network Simulator To Teach Basic Networking?


  1. Charge your devices the right way

  2. How to Spring Clean Your Digital Clutter to Protect Yourself

  3. When You Electronically Sign Documents, Always Keep a Copy

  4. How to freeze and lock your Linux system (and why you would want to)

  5. How to Set up a Used Mac When You Don't Know the User Name or Password

  6. How to check if you've been hacked

  7. How to safely open any USB device

  8. You don't need a new computer, here's how to keep your old one running like new

  9. Workstation Pro - VMware Products : Windows Virtualization for Everyone

  10. Linux on your laptop: A closer look at EFI boot options | ZDNet

  11. How to remap the Bixby button on most recent Samsung Galaxy devices! | Drippler - Apps, Games, News, Updates & Accessories

  12. 12+ essential iPad productivity tips

  13. Outlook vs. Gmail: Which works better for business?

  14. G Suite now lets users work with Google Docs, Sheets, and Slides directly inside Dropbox

  15. How to manage your Linux environment

  16. MyEclipse Learning Center - Genuitec

  17. How to create Servlet in MyEclipse IDE - javatpoint

  18. Two-Factor Authentication: Who Has It and How to Set It Up

  19. A short collection of Safari tips for iPhones, iPad

  20. How to Turn Off Email Trackers

  21. Here's how to securely wipe your Android smartphone for resale | ZDNet

  22. Famed Hacker Kevin Mitnick Shows You How to Go Invisible Online

  23. How to use your Mac safely in public places

  24. How to use the SwiftKey Keyboard

  25. Zipping files on Linux: the many variations and how to use them

  26. SQL tutorial: Learn SQL on MariaDB

  27. These secret settings instantly make any Android phone feel twice as fast

  28. How to See Which Facebook Advertisers Have Your Info

  29. How to Lock Down What Websites Can Access on Your Computer

  30. How To Stop Robocalls From Bothering You

  31. How to Set Up a Fake Phone Number

  32. Compiling and Installing - Apache HTTP Server Version 2.4

  33. 10 essential MySQL tools for admins

  34. bash howto debug - Google Search

  35. How to Get the Most Out of Gmail’s New Features

  36. Google’s light search app Go can now read you articles and web pages

  37. Gmail Update Helps Protect Businesses from Phishing, BEC Threats

  38. How to Protect Your Identity, Personal Data and Property

  39. Get the Fastest Wifi on Your Wireless Network With Wifi Explorer for Mac

  40. Learn Basic Javascript For Free With This Google App

  41. Build Free Databases

  42. How to build your own Alexa skills with the new Alexa Blueprints

  43. MySQL :: Download MySQL Community Server

  44. MySQL :: MySQL 5.7 Reference Manual :: B.5.3.2 How to Reset the Root Password

  45. Google Keeps a Record of Your ENTIRE Search History

  46. How to Manage Your Google Privacy Settings

  47. How to Check If Cambridge Analytica Could Access Your Facebook Data

  48. Get the Most Out of Your Kindle iOS App

  49. Want to Learn More About Computers? Try Building Your Own PC

  50. How to Manage All of Facebook's Privacy and Security Settings

  51. How to Group Mac App Icons More Prominently in Your Dock

  52. Google Lens Now Available for iOS: How to Get It

  53. Android Oreo: 18 advanced tips and tricks

  54. Here’s how you access the super creepy data Facebook has on you

  55. 12 tips to free up storage space on your Android phone or tablet | Drippler - Apps, Games, News, Updates & Accessories

  56. Constant Field Values (Java Platform SE 6)

  57. New Feature In Google Drive Improves Interoperability with Microsoft Office

  58. Top 32 Nmap Command Examples For Linux Sys/Network Admins - nixCraft

  59. How To Recover Linux Grub Boot Loader Password - nixCraft

  60. Cortana explained: How to use Microsoft's virtual assistant for business

  61. The Cognitive Biases That Convince You the World Is Falling Apart

  62. What is IFTTT? How to use If This, Then That services

  63. How to Keep Your Home Wi-Fi Safe From Hackers

  64. Ditch Your Smartphone Keyboard For Gboard

  65. How to Install Packages with Homebrew for OS X

  66. How to Customize Your Android Phone Exactly How You Like It

  67. How to Delete the Voice Data That Amazon Echo and Google Home Are Storing

  68. VMware shared folders - Google Search

  69. VirtualBox share folders - Google Search

  70. How to tweak the new Firefox 57 Quantum browser to suit your preferences | ZDNet

  71. How to Send Email to Any Cell Phone (for Free)

  72. build a computer - Google Search

  73. How to install or compile GIMP filters/plugins/extensions on Linux

  74. New Theory Cracks Open the Black Box of Deep Neural Networks

  75. How to Download Your Kindle Notes and Highlights and Export Them | The Digital Reader

  76. How to Stop Hackers From Ransoming Your Mac or iPhone [Updated]

  77. How to Turn Off App Ratings Requests in iOS 11

  78. Install Fedora Linux in Just 10 Steps

  79. Must-have Wi-Fi troubleshooting and management tools

  80. The Complete Guide to Speeding Up Your Virtual Machines

  81. IFTTT / Incompatible Browser

  82. IFTTT / Incompatible Browser

  83. Transfer Photos from Android to Mac OS X

  84. How to Create Shareable Download Links for Files on Google Drive

  85. 14 Practical Examples of Linux Find Command for Beginners

  86. The Best Keyboard Shortcuts for Bash (aka the Linux and macOS Terminal)

  87. How to install Bash shell command-line tool on Windows 10

  88. How to Snoop-Proof Any Phone or Tablet

  89. How to make the dock the most powerful part of your launcher | Drippler - Apps, Games, News, Updates & Accessories

  90. How to install Ansible on Apple MacOS X using command line

  91. Here's how to access the iPhone's hidden mode that turns the camera into a magnifying glass

  92. The Privacy Enthusiast's Guide to Using Android

  93. A Guide to Getting Past Customs With Your Digital Privacy Intact

  94. The travel-only Gmail account: A practical proposal for digital privacy at the US border

  95. Want to Sharpen Your Focus? Science Says to Drop These 5 Habits

  96. How to legally cross a US (or other) border without surrendering your data and passwords

  97. How to stop seeing your Amazon searches everywhere

  98. Vim Editor Modes Explained

  99. Automatic Backup in Linux using bash script / Linux data backup solution

  100. How to Schedule Tasks in Linux with Cron and Crontab

  101. How to Schedule Tasks on Linux: An Introduction to Crontab Files

  102. Quick HOWTO : Ch14 : Linux Firewalls Using iptables - Linux Home Networking

  103. Linux Server Security and Linux Network Security and How To Use Snort Intrusion Detection

  104. How to See Other Devices Logged in to Your Google Account

  105. How to Create a Bootable Backup of Your Entire Mac on an External Drive

  106. Hack Like a Pro: How to Secretly Hack Into, Switch On, & Watch Anyone's Webcam Remotely « Null Byte

  107. Stop HTML5 autoplay videos in Chrome, Firefox, Opera (but not Edge, Explorer, Safari) | PCWorld

  108. How to Unlock Your Phone Without Pressing the Home Button | TIME

  109. There's a hidden map in your iPhone of everywhere you've been

  110. 4 Great Firefox Addons For Anonymous Surfing and Improved Privacy - Make Tech Easier

  111. How to Start a WordPress Blog - Make Tech Easier

  112. Unlock the Hidden Power of Preview to Better Manage PDF Files [Mac] - Make Tech Easier

  113. How to Make a Bootable macOS Sierra USB Flash Drive

  114. Escaping from Zip Ties

  115. Easily Edit Documents with PDF Expert 2.0 for Mac

  116. How to Fix iOS 10's Biggest Annoyances

  117. Neural networks are powerful thanks to physics, not math

  118. 7 Tips and Tricks for Google Maps on Android - Make Tech Easier

  119. How to Add Blank Spaces to Your Mac's Dock - Make Tech Easier

  120. DeskDock shares your computer's mouse and keyboard with your Android device | Drippler - Apps, Games, News, Updates & Accessories

  121. 39 Brilliant Camping Hacks To Try On Your Next Trip

  122. How to Tame Your Negative Talk in Your Mind

  123. How To Use Google Photo Service in 7 Steps

  124. The Best Wireless Routers of 2016

  125. Convert File Formats on Linux with FF Multi Converter

  126. 10 Super Efficient Ways Inbox by Gmail Saves You Time

  127. 25 Google Search Hacks to Make Life Easier

  128. How to Remove a Service From the Context Menu on Mac

  129. 7 Creative Uses for Amazon Echo and Alexa

  130. How to Change the Launchpad Layout on Your Mac

  131. How to Hide the Menu Bar in OS X El Capitan

  132. 4 Tips to Make Your Mac Run Faster

  133. The Beginner's Guide to Creating Virtual Machines with VirtualBox

  134. How to install WordPress with Apache, MariaDB and PHP 7 on Arch Linux

  135. Linux Mint: The right way to react to a security breach | ZDNet

  136. How to Use a USB Flash Drive with Your Android Phone or Tablet

  137. symless/synergy

  138. 5 Favorite Ways to Collect Content in Evernote

  139. 11 Advanced Searches To Bookmark To Become A Google Power User

  140. Convert Virtual Machines from VMware to VirtualBox

  141. Evernote Can Encrypt Bits of Text to Keep Your Notes Private

  142. 15 Things You Didn’t Know You Could Do with Dropbox

  143. 4 very common Macbook problems—and how to fix them

  144. How to Play DVDs and Blu-rays on Linux

  145. How To Use a USB Stick To Securely Log In to Gmail

  146. How To Move Emails From One Gmail Account To Another

  147. How to see all the companies tracking you on Facebook — and block them

  148. How to use multi-app multitasking on the iPad Pro

  149. How to track your Linux laptop

  150. 10 of the best network and server monitoring tools

  151. Trim Will Find Your Subscriptions, Cancel Those You No Longer Want

  152. How to Play Classic Retro Games on Android

  153. Setting Up IP and Port Based Virtualhost Apache

  154. How to Activate GodMode in Windows 10

  155. How to do image steganography on Linux

  156. How to Export or Save All Pictures from MMS Text Messages on Android

  157. How to Enable and Use iCloud Drive on Your iPhone or iPad

  158. How to trigger commands on File/Directory changes with Incron on Debian

  159. How to Download YouTube Movies & Music on Android | Drippler - Apps, Games, News, Updates & Accessories

  160. 3 Powerful New Features to Try in iOS 9 | PCMag.com

  161. iOS 9 Hack: How to Access Private Photos and Contacts Without a Passcode

  162. Who gives the best advice about password security? | Naked Security

  163. How to Make a Program Run at Startup on Any Computer

  164. How to Save Google Maps Offline | PCMag.com

  165. How to Make Cool Gmail Signatures Right from Google Drive

  166. How to Convert Any File Format Online with Free Tools

  167. Collecting Ubuntu Linux System Information

  168. How to Mount a NTFS Drive on CentOS / RHEL / Scientific Linux

  169. How to Create Windows 10 USB Installer in Mac

  170. Google Classroom Launches Chrome Extension So Teachers Can Instantly Share Links With The Entire Class | TechCrunch

  171. Here are the best Gmail hacks to keep you on track

  172. Get the Best of MakeUseOf with Our New Android App, and Win a Samsung Galaxy S6 Edge!

  173. How to Fully Control Your Android Device from Any Computer | Drippler - Apps, Games, News, Updates & Accessories

  174. How and Why to Encrypt Your Text Messages

  175. How to monitor your system performance on (Ubuntu) Linux

  176. How To Organize Your Apps Using LaunchPad in OS X

  177. How to Encrypt and Decrypt Files on an Android Device

  178. The only technique to learn something new

  179. The ultimate guide to staying anonymous and protecting your privacy online - Slideshow | ExtremeTech

  180. Amazon's voice-guided speaker juggles your IFTTT tasks

  181. IFTTT Recipes That Help You Save Money

  182. 5 secret ways you can control your phone using Google search on your computer | Drippler - Apps, Games, News, Updates & Accessories

  183. Snap and edit pictures like a pro with these great Android photo apps | Drippler - Apps, Games, News, Updates & Accessories

  184. 9 Amazing ES File Explorer Features That Can Replace Other Android Apps | Drippler - Apps, Games, News, Updates & Accessories

  185. Here’s How to Download and Delete What Google Knows About You

  186. Use Your Mac’s Notification Center for Widgets, Scripts, and Notifications

  187. How to Enable CMD + n Shortcuts in Safari for Easy Tab Switching

  188. Securing tomcat - OWASP

  189. 4 "About:Config" Tricks to Extend The Functionality Of Firefox

  190. If you lose your Android phone, just Google 'Find My Phone' and it will

  191. Easily Create KVM Virtual Machines on Linux With GNOME Boxes

  192. How to Install Hardware Drivers on Linux

  193. How to Remove Bloatware on Android Without Rooting

  194. HiddenMe Hides all Your Mac Desktop Icons in One Click

  195. How to Use Your Mac’s Disk Utility to Partition, Wipe, Repair, Restore, and Copy Drives

  196. How to Convert a Physical Windows or Linux PC to a Virtual Machine

  197. How to Clear Your Dropbox Cache in Windows and Linux

  198. Configuration Mania Adds a Ton of Hidden Options to Firefox

  199. 6 Tricks You Can Use To Increase The Range Of Your Home Wi-Fi Router

  200. Five tips for cleaning and speeding up your Mac - CNET

  201. How to Disable Your Webcam (and Why You Should)

  202. Why You Really Want a Linux Virtual Server Instead of a Private Server

  203. How to Safely Share Your Smartphone, Computer, or Tablet With a Guest

  204. Google quietly backs away from encrypting new Lollipop devices by default | Ars Technica

  205. How to monitor server log files with Logwatch on Debian and Ubuntu

  206. Singapore’s Lee Kong Chian School of Medicine develops curriculum across time zones, with help from Dropbox for Business

  207. Review: Ring Video Doorbell | WIRED

  208. Featured: Top 10 Backup Apps For Android | Drippler - Apps, Games, News, Updates & Accessories

  209. Kindlebox Automatically Sends Books from Dropbox to Your Kindle

  210. Use Manual Refresh to Save Battery Life on Any Tablet or Smartphone

  211. What To Do If You Lose the Master Password to Your Password Manager

  212. Anyone With Your Mac Can Bypass Your Password Unless You Do This

  213. 4 tips to keep your business data private

  214. How to Make Macs and iOS Devices Work Together Seamlessly with Continuity

  215. Easily Share Files Between Windows 7, 8 and Mac OS X

  216. How to Use Bluetooth File Transfer Between OS X and Android 5.0 Devices

  217. Using secure shell (ssh) for login and secure copy (scp) for data transfer on Linux

  218. The Best Built-In Mac Tips You've Never Heard of, According to Reddit

  219. Everything You Can Do to Free up Space on Your Mac

  220. 4 Things You Didn't Know You Could Do With Google Earth Pro

  221. Repair Linux Boot failures in Grub 2 rescue mode

  222. How to Make a Smart Home From a Dumb One | PCMag.com

  223. How to Run a Full Linux Desktop in a Browser Tab on Your Chromebook

  224. ifttt Review & Rating | PCMag.com

  225. How to install Django on Ubuntu 14.04

  226. GRUB 2 boot menu basics and how to add a custom splash image

  227. 3 Common SQL Mistakes You are Probably Making as a Java Developer | DZone

  228. How to Power Up OS X's Spotlight with Flashlight

  229. 22 tips, tricks and shortcuts for Android Lollipop

  230. How to Anonymize Everything You Do Online | WIRED

  231. How to configure an NFS server and mount NFS shares on Ubuntu 14.10 | HowtoForge - Linux Howtos and Tutorials

  232. How do You Password Protect a Folder on Linux/Unix without Encryption?

  233. How to Unlock Hidden Settings In Your Favorite Software

  234. Learn to Build Android Apps with This Curated Collection of Courses

  235. Your Mac Logs Everything You Download, Here's How to Clear It Out

  236. Beginner's Electronics: 10 Skills You Need to Know

  237. Apple releases web tool to deregister phone numbers from iMessage | The Verge

  238. How to Find and Remove Duplicate Files on Mac OS X

  239. How To Safely Store A Password | codahale.com

  240. How Inbox by Gmail Works, and How to Use It for More Productive Email

  241. How to Use Handbrake to Convert Any Video File to Any Format

  242. How to Identify and Solve your Android Battery Problems | Drippler - Apps, Games, News, Updates & Accessories

  243. Hands On With Google Inbox: Useful Email Triage Tools For A Mobile Workflow | TechCrunch

  244. Useful SystemD commands (hints for systemctl or systemctl vs chkconfig and service)

  245. I Want to Write Android Apps. Where Do I Start?

  246. How to configure a host intrusion detection system on CentOS - Xmodulo

  247. Secure Your Linux Desktop and SSH Login Using Two Factor Google Authentication

  248. How to Organize Your Linux File System for Clutter-Free Folders | Linux.com

  249. mamp - Google Search

  250. How to Set Up Family Sharing in iOS 8 | News & Opinion | PCMag.com

  251. How to Save the Net | Magazine | WIRED

  252. DIY NAS: EconoNAS 2014

  253. The Apps You Need to Deauthenticate Before Selling Your Devices

  254. Plan Your Free Online Education at Lifehacker U: Fall Semester 2014

  255. How to make your email address as hard to guess as your password

  256. Stop Thieves From Recovering Your Data After A Factory Reset

  257. Creating Bibliographies & Footnote Citations Is Easier With Bookends for Mac

  258. How To Install Tomcat On CentOS 7 | HowtoForge - Linux Howtos and Tutorials

  259. 7 Tips For Less Terrible Smartphone Photos

  260. How to Easily Encrypt Files on Windows, Linux, and Mac OS X

  261. Troubleshoot Your Mac With These Hidden Startup Options

  262. ISC Diary | Stop, Drop and File Carve

  263. Evernote Food Saves, Organizes, and Helps You Find Great New Recipes

  264. How to create a VPN shortcut in OS X | MacFixIt - CNET Reviews

  265. What to Do (If Anything) About a Cluttered OS X Desktop | Gadget Lab | Wired.com

  266. Google Drive Blog: Bringing people together in Drive

  267. The Best Experimental Chrome Features You Should Check Out

  268. Use nettop command to check per-application network activity in OS X | MacFixIt - CNET Reviews

  269. Use OS X Finder shortcuts in Open and Save dialog boxes | MacFixIt - CNET Reviews

  270. Mac OS X Easter Eggs - Business Insider

  271. Give Your Laptop and Smartphone a Spring Cleaning

  272. How to Set Up Your Own Private Cloud Storage Service in Five Minutes with OwnCloud

  273. ISC Diary | The HTTP "Range" Header

  274. Multiboot Linux distributions from one USB key - LinuxBSDos.com

  275. How to Make Windows 8 Look and Feel Like Windows 7

  276. Mac Remote Controls Your Mac from the Comfort of Your Android Phone or Tablet

  277. Apple Adds Two-Factor Authentication to Apple ID, Here's How to Set It Up

  278. How to Boot Into Linux from Your Android Phone

  279. Instantly Hide Any File in OS X by Putting It In Your Library Folder

  280. Apache Tomcat 6 Installation on OS X 10.7 Lion and Eclipse Integration | Whatta-Whatta

  281. Cool User File Systems, Part 1: SSHFS | Linux Magazine

  282. What To Do After You've Been Hacked | Gadget Lab | Wired.com

  283. Nova Launcher

  284. How to install Google Play Store apk & Launcher on Kindle Fire HD/2

  285. [ROOT] How To: Root the Kindle Fire 7" HD or 2 with Linux/MAC - Noob (Simple) Version - xda-developers

  286. Make Your Own Pocket-Sized, Grid-It-Style Organizer for $2.50

  287. Daemonize a bash Script

  288. Linux Daemon Writing HOWTO

  289. How to Create a Strong Password in Wake of Twitter Hack Episode - CIO.com

  290. Hackers release iOS 6.1 jailbreak utility - Network World

  291. Build a Computer This Weekend

  292. Encrypt Your Data With EncFS (Fedora 18) | HowtoForge - Linux Howtos and Tutorials

  293. Turn a Raspberry Pi into a Personal VPN for Secure Browsing Anywhere You Go

  294. Video: The Philips uWand Is All I Want in a Smart TV Remote Control | Gadget Lab | Wired.com

  295. Learn Beginner and Advanced HTML/CSS Skills for Free

  296. Five Best Desktop Media Servers

  297. review-linux-live-usb-creator-makes-it-easier-to-install-linux.html

  298. This Is the Best of Lifehacker 2012

  299. Most Popular How-To Guides of 2012

  300. Set Up a Raspberry Pi as a Personal Web Server

  301. Automatically Create Evernote Template Notebooks with AppleScript

  302. Five Best Deal Sites

  303. MySQL 5.5 Admin Cheat Sheet from DZone Refcardz - Free, professional tutorial guides for developers

  304. The Perfect Desktop - Ubuntu 12.10 (Quantal Quetzal) | HowtoForge - Linux Howtos and Tutorials

  305. iPhone 5 Setup and Security Guide

  306. How to Secure and Encrypt Your Web Browsing on Public Networks (with Hamachi and Privoxy)

  307. Inotify: Efficient, Real-Time Linux File System Event Monitoring

  308. Remote MySQL Performance And Query Monitoring | HowtoForge - Linux Howtos and Tutorials

  309. http://www.networkworld.com/research/2012/110612-pc-security-your-essential-software-264010.html

  310. Turning the smartphone from a telephone into a tricorder | ExtremeTech

  311. Lifehacker.com Updates: QuickLock Is A Better Way To Lock Your Mac

  312. 20 Linux Server Hardening Security Tips

  313. Coffee Table Pi

  314. How to install Google's Chrome OS | ZDNet

  315. When You Need to Remember Something You Can't Write Down, Think of Something Crazy

  316. PSA: The Dot In Your Gmail Address Doesn’t Matter | TechCrunch

  317. Sleeping On Difficult Problems Actually Helps Solve Them

  318. Amazon's Remote Wipe of Customer's Kindle Highlights Perils of DRM | Gadget Lab | Wired.com

  319. Insync - Your Google Docs backup and sync tool

  320. how_to_adjust_settings_in_vlc_to_permanently

  321. How to Break Into a Mac (And Prevent It from Happening to You)

  322. The Ultimate Beginner's Guide To AppleScript | Mactuts+

  323. HTC Security Flaw Found on Multiple Android Phones

  324. iPhone, iOS 6 Apps to Monitor Your Network, Find WiFi

  325. Making Your own Custom Linux Distro - YouTube

  326. How do I select which folders to sync to my computer?

  327. Site44 Creates Web Sites from Dropbox Folders, Perfect for Personal Landing Pages and Resumes

  328. SSH tip: Send commands remotely | MacFixIt - CNET Reviews

  329. freedesktop.org - Software/systemd/FrequentlyAskedQuestions

  330. Lock down your social media with essential security add-ons | PCWorld

  331. If Your Android Phone Is Stolen, This App Photographs the Thief - Yahoo! News

  332. How a Secret Sequence of Doorbell Buzzes Can Unlock Your Home With

  333. [SAMSUNG GALAXY S3 QCOM TOOLKIT V2.3] Drivers Backup Root CWM BusyBox + MORE [SPR] - xda-developers

  334. Cracked! Hacker Claims to Jailbreak the iPhone 5. - Mike Isaac - Mobile - AllThingsD

  335. How to add and arrange Home screens on the Galaxy S3 | Android Central

  336. How to Root U.S. and Canada Galaxy S3 SGH-T999/SGH-I747/SPH-L710! [Fail-Proof][Noob-Proof][U.S. Cellular] | GalaxyS3Root.com

  337. Here's the List of iOS 6 Compatible Jailbreak Tweaks

  338. Kindle Fire HD 7-inch rooted in spite of Amazon, unstoppable force meets the unhackable object (video) -- Engadget

  339. How to root the Sprint Galaxy S3 L710 without increasing flash counter

  340. [VIDEO] How to Root the Amazon Kindle Fire HD Tablet - xda-developers

  341. Managing Multiple MySQL Servers From One phpMyAdmin Installation (Using SSL Encryption) | HowtoForge - Linux Howtos and Tutorials

  342. Get Google and iOS Living Together in Perfect Harmony

  343. WiFi Pineapple Mark IV | jwz

  344. HakShop — WiFi Pineapple Mark IV

  345. Got a BMW? Thicko thieves can EASILY NICK IT with $30 box • The Register

  346. Customizable Shortcuts for Firefox Lets You Create Key Commands for Anything

  347. Google releases new Java to iOS source code translator -- Engadget

  348. Evernote For Education: Citelighter Teams Up With Cengage To Take The Pain Out Of Online Research | TechCrunch

  349. How to quickly create an encrypted archive in OS X | MacFixIt - CNET Reviews

  350. Computer Hacking/Security Testing with BackTrack5

  351. Spec Comparison: Apple's iPhone 5 vs. Samsung Galaxy S3 - The Mac Observer

  352. Installing Apache2 With PHP5 And MySQL Support On OpenSUSE 12.2 (LAMP) | HowtoForge - Linux Howtos and Tutorials

  353. Backtrack 5 : How to Bypass Antivirus and Hack Window Systems / SET – (Tutorial) « Connection Reset By Peer

  354. Lifehacker top 10 News, Videos, Reviews and Gossip - Lifehacker

  355. Videos | Tenable Network Security

  356. Tenable Network Security: Enabling Nessus on BackTrack 5 - The Official Guide

  357. Pinpointing Your Security Risks - IT Security

  358. How to create and use Live USB - FedoraProject

  359. Turn Any Laptop Into a Money-Saving Wi-Fi Hotspot For Your Hotel Room

  360. 18 great IT tools for Android

  361. Norton Utilities 15 Review & Rating | PCMag.com

  362. Welcome to SecurityTube.net

  363. Parallels Desktop 8 and VMWare Fusion 5 announced | MacFixIt - CNET Reviews

  364. Learn to Code a Basic iPhone App

  365. How to Dual Boot Linux on Your Mac and Take Back Your Powerhouse Apple Hardware

  366. The Twilight Desktop

  367. iBuildApp :: Create Free iPhone App Using Online Interface Builder| Android, iPad

  368. How Technology Helps Keep This 3,000-Student Class Engaged | Digg Technology

  369. Delete Dropbox cache to recover drive space | Macworld

  370. Master MySQL in the Amazon Cloud | PCWorld Business Center

  371. Pick the right shutter speed for every photographic situation | Macworld

  372. Why Mosh is better than SSH? - LinuxScrew: Linux Blog

  373. Speed Up Dropbox's File Syncing with a Simple Tweak

  374. How to hack your own Wi-Fi network

  375. Just Show Me: How to read Microsoft Office files on your Kindle Fire | Technology News Blog - Yahoo! News

  376. Easily Shake The Eggshells Off A Bunch of Boiled Eggs

  377. The Best Online Backup App for OS X

  378. How to Customize Any Folder or App Icon Using Any Image in OS X

  379. Review: 7 password managers for Windows, Mac OS X, iOS, and Android

  380. 16 ultimate SSH hacks

  381. Sync iPad to Multiple Computers - Guides of Syncing iPad with Multiple Computers - StumbleUpon

  382. how to hack video screens on times square - YouTube

  383. Thanks, Dev-Team! New iPad Already Jailbroken [Updated] | PCWorld

  384. Tweaking Lion's firewall | Macworld

  385. USB Outlet Quattro-”the Gadget Plug”

  386. Read Later Brings Instapaper, Read It Later to Your Mac's Desktop

  387. How to Create a Custom Theme for Your WordPress Blog with Minimal Coding Required

  388. Sync Files and Folders Outside Your My Dropbox Folder

  389. CyberKiko | Dropbox and multiple sync folders

  390. Ubuntu for Android | Ubuntu

  391. Creating A Portable MySQL On CentOS 6 And Ubuntu 11.10 Linux From Sources | HowtoForge - Linux Howtos and Tutorials

  392. Secrets

  393. Mac OS X Lion — Changing SSHD port | .: A Blog To Be Named Later :.

  394. See How SugarSync Stacks up to the Competition - SugarSync

  395. File Sync & Online Backup - Access and File Sharing from Any Device - SugarSync

  396. MyEclipse UML | Eclipse UML diagrams | UML Modeling Capabilities :: MyEclipse

  397. my_laptop_was_stolen_but_dropbox_is_running_and_i

  398. The MacPorts Project -- Download & Installation

  399. Ten OS X Command Line Utilities you might not know about

  400. Handy Mac OSX Command Line Tricks | Snipe.Net

  401. How to Crack WPA2 WPS WiFi password

  402. 6 Ways to Defend Against Drive-by Downloads | PCWorld

  403. macosx - Full guide for installing tomcat on OS X - Server Fault

  404. How To: Upgrade a Wall Outlet to USB Functionality

  405. Changing Apache Server Name To Whatever You Want With mod_security On Debian 6 | HowtoForge - Linux Howtos and Tutorials

  406. Pimp Your Facebook: How to Create a Badass Timeline Banner

  407. Four ways to make the Dock more powerful | Macworld

  408. MySQL Reference for OS X

  409. 14 Practical Ways to Use Evernote

  410. How to Unlock Padlocks Without a Key Using Cheap DIY Shims

  411. SSH tricks

  412. Pro Tips for Regular People: Five Photography Tricks Anyone Who Owns a Camera Should Know

  413. How to Roll Your Own Awesome Drag-and-Drop File Sharing Service

  414. diary.html

  415. Five Best Ways to Stream Live TV

  416. WiFi garage door opener makes forgotten keys a thing of the past - Hack a Day

  417. How to use your iPad or iPhone as a second monitor — Mac Tips

  418. Be a Grown Up Boy Scout: The Wilderness Survival Skills Everyone Should Know

  419. Using Bash To Output To Screen And File At The Same Time

  420. AssistantExtensions Is an All-In-One Siri Hack Manager

  421. MyEclipse UML Tutorial

  422. De-Mystifying the Dark Corners of Windows: The Registry, DLLs, and More Explained

  423. How To Maintain and Use Collaborative Grocery Lists

  424. Remove Unnecessary System Preferences Icons in OS X to Simplify Your Settings

  425. Everything You Thought You Knew About Learning Is Wrong | GeekDad | Wired.com

  426. How To Install Siri on iPad 2 -Video

  427. My Top 10 Jailbreak Tweaks

  428. The Best Wi-Fi Articles for Securing Your Network and Optimizing Your Router

  429. 7 Things I Learned From Building My First Desktop PC | PCWorld

  430. Install A Hard Drive Or SSD In Your Notebook's Optical Bay : Tiered Storage In A Single-Bay Notebook

  431. Evi one-ups Siri for iOS and Android

  432. How to Build a (Nearly) Hack-Proof Password System with LastPass and a Thumb Drive

  433. Online Tool Converts JavaScript Bookmarklets into Chrome Extensions | PCWorld

  434. Deleting Files Within Lion's Applications Folder | PCWorld

  435. iPhone 4S and iPad 2 Finally Get Proper, Untethered Jailbreaks

  436. The Always Up-to-Date Guide to Jailbreaking Your iPhone, iPod touch, and iPad [iOS 5.0.1]

  437. Going Google-Free: The Best Alternatives to Google Services on the Web

  438. Installing Apache2 With PHP5 And MySQL Support On Fedora 16 (LAMP) | HowtoForge - Linux Howtos and Tutorials

  439. 7 Essential CSS3 Tutorials For Web Developers | Digg Technology

  440. MiniPwner Is a Cheap Penetration Tester and Portable Wi-Fi Node

  441. 35 MacGyver Tips, Clever Uses, and Other Life Hacks in One Infographic

  442. How to Prevent WordPress Site From SQL Injection Attack

  443. Performance Upgrades; FireWire USB SATA Storage; Memory, more at OWC

  444. Apple - OS X Lion Recovery - Introducing Lion Recovery

  445. Troubleshooting: My computer won't turn on

  446. iMac G5: How to Reset the SMU

  447. The Best Jailbreak Apps for iOS 5

  448. Add a Custom Message to Your Mac OS X Login Screen to Help People Contact You If Your Mac is Lost

  449. How to Boost Your Reading Comprehension by Reading Smarter and More Conscientiously

  450. EncFS 1.7.4 installer for Mac OS X available - BoxCryptor Blog

  451. Encrypted Filesystem for Mac OS X

  452. Best of Lifehacker 2011 News, Videos, Reviews and Gossip - Lifehacker

  453. Five Best Video Editors

  454. The Best System Tweaker for Linux

  455. External desktop hard drives buying guide | Macworld

  456. File Management Apps : How and Why to Root your Android: 15 Worthwhile Apps

  457. How to Root Kindle Fire for Mac OSX or Linux! | RootKindleFire.com

  458. The Get More Out of Google Infographic Summarizes Online Research Tricks for Students

  459. Finally, Some Privacy! Cool LCD Monitor Hack Helps Keep Your Secrets | PCWorld

  460. How to Choose A Cloud Storage Provider: Security - storage Blog

  461. Headphones buying guide | Macworld

  462. Best SSDs For The Money: November 2011 : Best SSDs For The Money: November Updates

  463. Macs, Kindle Fire, and managing files | Macworld

  464. Best Chrome Extensions

  465. Virtualization With KVM On Ubuntu 11.10 | HowtoForge - Linux Howtos and Tutorials

  466. Download a Free Dynamic DNS Update client for your dynamic IP

  467. How to Fix Your Family’s Computer This Holiday So the Rest of the Year Is Easy

  468. How to Securely Wipe Your Data from Any Phone on Any Platform

  469. How to Improve Your iPhone's Battery Life

  470. Enabling and disabling cookies | How to | Firefox Help

  471. Disable AutoRun to Stop 50% of Windows Malware Threats

  472. Apple’s Cloud-Based Music Service Now Live On iTunes | Gadget Lab | Wired.com

  473. HOWTO: SSH Tunneling Made Easy

  474. ArchBang Brings Arch Linux's Greatest Features to Your PC Without the Stressful Installation

  475. How to Make (and Sustain) a Good First Impression Every Time

  476. How to Use Photoshop to Pop Pimples, Change Facial Expressions, and Alter Reality As We Know It

  477. abyssoft - teleport

  478. Apache/NCSA Custom Log Format

  479. Best 5 monitors for professionals | Crave - CNET

  480. 5 More PC Upgrade Mistakes (And How To Avoid Them) | PCWorld

  481. Synergy

  482. Replace Your Keychain w/Technology, Convenience, & Style - Keyport Slide and Blades | Keyport, Inc.

  483. iOS 5 Shortcut Feature Enables A Hilarious Prank

  484. Microsoft Lync client for Linux ~ MyTricks

  485. Compare directories via diff - Mac OS X Hints

  486. Five Best Disk Defragmentation Tools

  487. How to Crack a Wi-Fi Network's WEP Password with BackTrack

  488. Top 10 Ways to Unlock the Unlockable

  489. WinX DVD Ripper Platinum Preview | PCMag.com

  490. How to Break Into a Windows PC (and Prevent It from Happening to You)

  491. Making UEFI Secure Boot Work With Open Platforms | The Linux Foundation

  492. A Guide to Sniffing Out Passwords and Cookies (and How to Protect Yourself Against It)

  493. A Guide to Sniffing Out Passwords and Cookies (and How to Protect Yourself Against It)

  494. What to Do When You've Forgotten Your Smartphone's Passcode

  495. How to bypass the iPad 2 password in five seconds : technology

  496. A Gadget for the Home Learns by Degrees - Katherine Boehret - The Digital Solution - AllThingsD

  497. Bump Key HOWTO

  498. Silence Noisy Neighbors by Transmitting Your Music to Their Speakers

  499. Pick Locks - Wired How-To Wiki

  500. The Perfect Desktop - Ubuntu 11.10 (Oneiric Ocelot) | HowtoForge - Linux Howtos and Tutorials

  501. Installing Apache2 With PHP5 And MySQL Support On Ubuntu 11.10 (LAMP) | HowtoForge - Linux Howtos and Tutorials

  502. TonidoPlug - Tiny, Low Power, Low Cost, Linux Home Server | Access your files, music and media from anywhere

  503. More ways to move data to a new Mac

  504. Groovy - Home

  505. Learn How to Pick Locks from a Competitive Lockpicker Who Truly Loves Locks

  506. BackTrack Wiki

  507. The Best Disk Cloning App for Mac OS X

  508. Spool Is Instapaper On Steroids | TechCrunch

  509. Open Security Screws with a Rotary Tool

  510. The Always Up-To-Date Guide to Rooting Any Android Phone

  511. Synapse Is a Super-Fast, Tightly Integrated Application Launcher for Linux

  512. Cartoonify Photos with the GIMP

  513. What Settings Should I Change on My Wi-Fi Router? [Ask Lifehacker]


  1. All the Best iPadOS Features That You Don't Get in iOS

  2. Here’s What Sets iPadOS Apart from iOS - TidBITS

  3. iOS, iPadOS and tvOS 13.1 updates are now available – TechCrunch

  4. An introduction to the Linux boot and startup processes

  5. Apple iOS 13 Has 25 Great Secret Features

  6. How to take full advantage of Android 10's privacy-reclaiming powers

  7. 21 Best Kali Linux Tools for Hacking and Penetration Testing

  8. Take These Steps Before Installing Android 10 on Your Phone

  9. Linux on your laptop: Here's what you need to know about UEFI firmware | ZDNet

  10. The best Android file manager apps

  11. Microsoft wants to bring exFAT to the Linux kernel – TechCrunch

  12. Working with variables on Linux

  13. The best Android keyboard apps for on-the-go productivity

  14. Two thirds of Android antivirus apps don't work properly

  15. Know When Malware Tries to Access Your Mac's Camera or Mic With This App

  16. What is Linux? Everything you need to know about the open-source operating system

  17. How to identify shell builtins, aliases and exe files on Linux systems

  18. Command-Line Tip: Put Down the Pipe | Linux Journal

  19. Testing openSUSE, Manjaro, Debian, Fedora, and Mint Linux distributions on my new laptop | ZDNet

  20. How to Speed up Your Mac | Digital Trends

  21. Android security: Analysis, advice, and next-level knowledge

  22. 13 Best File Managers for Linux Systems

  23. systemd-analyze plot - Google Search

  24. Microsoft Pledges to Protect Linux and Open Source With Its Patents

  25. Understanding Bash: Elements of Programming | Linux Journal

  26. 10.6. Creating and Modifying systemd Unit Files Red Hat Enterprise Linux 7 | Red Hat Customer Portal

  27. systemd file locations fedora - Google Search

  28. With Linux’s founder stepping back, will the community change its culture?

  29. bash howto - Google Search

  30. The Best New Features to Try in iOS 12

  31. 10 best email apps for Android

  32. Microsoft’s bid to secure the Internet of Things: Custom Linux, custom chips, Azure

  33. The best Android file manager apps

  34. Fedora 28 Set to Deliver New GNOME Linux Desktop for Workstations

  35. Why not the best? Why not Linux Mint?

  36. 21 keyboard shortcuts Mac users need to know

  37. 10 Ways KDE Is a Better Linux Desktop Than GNOME

  38. How to Install Software on Linux

  39. 7 Useful macOS Tricks You Might Not Know

  40. How to mount an ISO image/file under Linux - nixCraft

  41. Five hidden features of Android 8.0 Oreo you should be using

  42. Home - FUSE for macOS

  43. Mingis on Tech: All about Android 8.0 'Oreo'

  44. 24 Things You Can Do in iOS 11 That You Couldn't Before

  45. iOS 10 Tips and Tricks for iPad - Apple Support

  46. iOS 11 improvements that Apple wants to tell you about

  47. Apple shows you how to use iOS 11 on iPad Pro

  48. Linux Operating Systems for The Paranoid: What Are The Most Secure Options?

  49. How to run multiple commands in sudo under Linux or Unix

  50. OpenSnitch: The Little Snitch application like firewall tool for Linux

  51. The 10 Best Launchers for Android | Drippler - Apps, Games, News, Updates & Accessories

  52. The Best Email Client for MacOS

  53. How to Use Your Bash History in the Linux or macOS Terminal

  54. Apple Clips (for iPhone)

  55. Mac Users Should Ditch Google Chrome for Safari

  56. Bixby Brings Samsung Smartphones Into the Personal Assistant Era

  57. Linux Commands - Overview and Examples

  58. Parrot Security OS 3.5 Improves Linux Security Tools Distribution

  59. All the Folders You Can Probably Exclude From Your Mac's Backups

  60. What’s the Difference Between Bash, Zsh, and Other Linux Shells?

  61. How to create Kali Linux bootable USB live in windows 10

  62. WiFi Pineapple NANO: Kali Linux 2.0 Internet Connection Sharing

  63. Which Linux File System Should You Use?

  64. How to find all hard links in a directory on Linux

  65. How to setup a Linux server on Amazon AWS,

  66. 5 Interesting New Photo Viewing and Editing Apps to Download

  67. The Most Used Linux Terminal Commands and What They Do

  68. Five Tools for Beginners that Power Up the Command Line

  69. Linux command line navigation tips/tricks 3 - the CDPATH environment variable

  70. How to Copy Multiple Things to Your Mac’s Clipboard at Once

  71. Advanced Bash-Scripting Guide

  72. My First 10 Minutes On a Server - Primer for Securing Ubuntu

  73. How to split a large archive file into multiple small files using Split command in Linux

  74. GNU GRUB Manual 2.00

  75. Android 7.1's Keyboard Is Hiding a Handy New GIF Search Tool

  76. Pixel Phones Bought From Google Will Have Unlockable Bootloaders

  77. 7 Reasons Why You Should (and Shouldn’t) Dual Boot Linux

  78. Systemd - FedoraProject

  79. SysVinit explained: starting and stopping of services | linuxvoodoo.com

  80. Boot process, Init and shutdown

  81. Meet systemd, the controversial project taking over a Linux distro near you

  82. systemd - Wikipedia, the free encyclopedia

  83. The Story Behind 'init' and 'systemd': Why 'init' Needed to be Replaced with 'systemd' in Linux

  84. linux startup systemd vs systemv - Google Search

  85. 10 Most Valuable Features in Apple's macOS Sierra

  86. Apple to fix backup security vulnerability in iOS 10

  87. Top 10 iOS 10 Features for iPad

  88. 12 hidden features in iOS 10

  89. Top 10 Terminal Tricks in macOS

  90. Kali Linux 2016.2 Delivers New Security Testing Options

  91. linux distro comparison - Google Search

  92. Bash Guide for Beginners, Free Machtelt Garrels Guide

  93. 5 of the Best Antivirus Programs for Ubuntu - Make Tech Easier

  94. Linux Took Over the Web. Now, It’s Taking Over the World

  95. LinuxCon: Tracing Linux's Roots, Mapping Its Future

  96. Linux at 25: What's Behind Its Success and Where It's Going

  97. How To Create ISO Files In Linux

  98. How Net Neutrality Works, And How It Affects You

  99. What You Must Know About Linux Rootkits

  100. How to Install Encfs and Encrypt Files in Mac OS X - Make Tech Easier

  101. Three Ways to Password Protect Folder on Mac OS X(El Capitan Included)

  102. How to Lock A Folder on Mac for Free without Software(El Capitan Included)

  103. Run Android Apps on Linux with Shashlik

  104. Cyborg Hawk Linux - Penetration Testing Linux Distro - Darknet - The Darkside

  105. Parallels, VMware, VirtualBox & Boot Camp face off

  106. Fedora 23 Improves Security, Desktop and Cloud

  107. 11 Hidden OS X El Capitan Features You Might Not Know About

  108. How to Use OS X’s New Split Windows View

  109. How to Enable Android 6.0’s Experimental Multi-Window Mode

  110. How to Easily Select Your Default Apps in Android 6.0

  111. How to Use Android 6.0’s Built-in File Manager

  112. How to speed up your internet connection on Linux

  113. 14 Things You Can Do in Android Marshmallow That You Couldn't Do in Lollipop

  114. How to Install and Configure CSF (Config Server Firewall) on CentOS 7

  115. How to Change a USER and GROUP ID on Linux For All Owned Files

  116. The Beginner’s Guide to Shell Scripting: The Basics

  117. systemd

  118. How To SSH Run Multiple Command On Remote Machine And Exit Safely

  119. Howtoforge Linux Tutorials.

  120. BackBox Linux - Penetration Testing LiveCD - Darknet - The Darkside

  121. Top 3 Online Resources For Learning The Command Line

  122. Debugging Bash scripts

  123. Bash Shell PS1: 10 Examples to Make Your Linux Prompt like Angelina Jolie

  124. Intel's New Processors Bring 'Most Significant Advancements in Computing'

  125. Linus Torvalds Talks Linux Security at LinuxCon

  126. 5 YouTube Videos to Help You Get Started with Linux

  127. 4 of the Best Markdown Editors for Linux

  128. 5 Cool Android Camera Tricks with Camera360 Ultimate

  129. VirtualBox error "VT-x is disabled in the BIOS. (VERR_VMX_MSR_VMXON_DISABLED)"

  130. 22.9. Enabling Intel VT-x and AMD-V virtualization hardware extensions in BIOS

  131. virtualbox.org • View topic - Error after upgrade:VT-x is not available. (VERR_VMX_NO_VMX)

  132. Pentoo - Gentoo Based Penetration Testing Linux LiveCD - Darknet - The Darkside

  133. Rosetta Stone for Unix

  134. Linux Vs Unix: The Crucial Differences That Matter To Linux Professionals

  135. What Really Happens When You Delete Something from Your PC

  136. Android Lollipop: Taking mobile security to a new level

  137. Linux File Systems: Ext2 vs Ext3 vs Ext4

  138. General overview of the Linux file system

  139. Comparison of Linux distributions - Wikipedia, the free encyclopedia

  140. Linux Journal | The Original Magazine of the Linux Community

  141. How To Easily Enable Silverlight, And Watch Netflix, on Linux

  142. netfilter/iptables project homepage - The netfilter.org project

  143. I have a SysV init script on Fedora 18. How can I make it start after the network is ready? - Stack Overflow

  144. KDE System Administration/Startup - KDE TechBase

  145. Glx-Dock / Cairo-Dock - Home

  146. LibreOffice Review & Rating | PCMag.com

  147. Using Linux in a Windows world

  148. The Best Navigation App for iOS

  149. Demystifying Android 4.2 Jelly Bean | ExtremeTech

  150. Buzzblog: EXCLUSIVE: Watch Steve Jobs play FDR in Apple's long-lost takeoff on famous '1984' Macintosh TV commercial

  151. Bartender Cleans Up Your Mac’s Menubar

  152. Opening the OS X Firewall for your Server

  153. Top 10 Downloads That Enhance Mac OS X's Built-In Tools | Digg Technology

  154. NTFS-3G for Mac OS X: NTFS-3G 2009.4.4

  155. Mounting remote filesystems on OSX Leopard using sshfs, MacFuse and Macfusion

  156. Mac Os X: Mount NFS Share / Set an NFS Client

  157. 10.6: Mount remote Linux sshfs disks in 64-bit 10.6 - Mac OS X Hints

  158. The MacPorts Project -- Home

  159. The Best News Reader Application for Linux

  160. Eight tips for OS X's Quick Look | Macworld

  161. The Best Virtual Assistant for Android

  162. SlingPlayer (Kindle Fire Edition) Review & Rating | PCMag.com

  163. 15 Apps and Tweaks That May Convince You to Jailbreak Your iPhone

  164. OSXFUSE for Mac

  165. The best tidbits from the Steve Jobs bio - CNN.com

  166. Linux Desktop Faceoff: GNOME 3 Shell vs Ubuntu Unity

  167. 15 Free Apps for Personalizing Your Android Phone

  168. Systemd - FedoraProject

  169. 18 ways to view the ~/Library folder in Lion | Operating Systems | Macworld

  170. MacBook Air and OS X Lion synergy: A big hurdle for Windows 8 | ZDNet

  171. Virtualboxes.org Helps You Discover Your New Favorite Linux Flavor with Tons of Virtualbox Images

  172. Top 10 Secret Features in Mac OS X Lion

  173. Linux 3.0 a Steady Step Forward | PCWorld

  174. Oracle VM VirtualBox

  175. Get the Linux Mint GNOME Menu in Ubuntu [Linux Tip]

Student Info

  1. Software jobs pay twice the national average

  2. 8 hot IT security jobs and what they pay

  3. 7 High-Paying Jobs You Can Get Without a 4-Year College Degree

  4. Top 15 data science professional development certificates

  5. The highest-paying entry-level job in tech pays $113,254 a year—here are the other 9

  6. Blockchain jobs remain unfilled, while skilled workers are being poached

  7. 11 business intelligence certifications to advance your BI career

  8. 15 top data science certifications

  9. A movement to prepare students for the future of work

  10. The Deeper Education Issue Under the College Bribery Scandal

  11. Demand for blockchain engineers is ‘through the roof’

  12. 10 IT skills paying the highest premiums today

  13. What Frameworks and Languages Are Developers Using in 2019?

  14. Best-paying programming languages, skills: Here are the top earners | ZDNet

  15. AWS Training and Certification - Machine Learning

  16. Amazon says it’s making freely available the same machine learning courses that it uses to teach its own engineers

  17. 10 Impressive Questions to Ask in a Job Interview

  18. Cybersecurity, AI skills to dominate IT staff hires in 2019 | ZDNet

  19. 10 must-have skills for ITSM pros

  20. Gartner: IT spending to hit $3.8 trillion; enterprise software, IT services outlays lead way

  21. The 15 top-paying certifications of 2018

  22. According to Hiring Managers, 1 Type of Resume Makes You Look Desperate

  23. This Is The #1 Resume Lie That'll Cost You A Job According To Hiring Managers

  24. The 7 most in-demand tech jobs for 2018 — and how to hire for them

  25. The future technology skills that will keep you in work

  26. AI and the Future of Work

  27. More Companies Teach Workers What Colleges Don’t

  28. The blockchain market is hot; here's how to learn the skills for it

  29. Net Neutrality: Everything You Need To Know

  30. How IT Professionals Can Survive, and Thrive in, an Automated World

  31. Demand for cyber security skills outstrips internal supply, research finds

  32. 9 Things to Consider Before Accepting a New Job

  33. The Interview Question That's Always Asked (and How to Nail It)

  34. How to spot 4 common lies employers tell job applicants

  35. Scan Your Social Profiles Like a Potential Employer Will

  36. 10 Great Places to Work at Large, Medium and Small Tech Companies

  37. Old School May Be Better Than High-Tech.

  38. Americans who haven't gone to college are way worse off today than 40 years ago

  39. Skills shortage tops Security Serious agenda

  40. Top 10 most desired traits for cybersecurity job candidates

  41. The next IT jobs boom? The internet of things

  42. 10 in-demand jobs for workers without a bachelor's degree

  43. Why Tech Pros Need to Develop Soft Skills

  44. Facebook helped advertisers target teens who feel “worthless”

  45. Amazon’s CEO Perfectly Explains AI in Just Two Sentences

  46. Computerworld's IT Salary Survey 2017 results

  47. Cybersecurity jobs are there for the taking. Are you ready?

  48. Python on the Web: The Amazing Things You Can Build

  49. JavaScript Is Still Most Popular Language, but Developers Love Rust

  50. Science: 81 Percent of People Lie in Job Interviews. Here's What Top Companies Are Doing Instead

  51. Five Questions You Absolutely, Positively Must Ask On A Job Interview

  52. A woman who has reviewed over 40,000 résumés outlines the 8 most annoying mistakes she sees

  53. Tutorials for Spring AOP, Gerrit, Spring MVC, Apache Solr, Excel Power View, Sencha Touch, Tex Commands, Agile Testing, Apache Tajo, C++ Library, MariaDB, SAP QM, SAP SOLMAN, SAP SCM, MS Access, KoaJS, OAuth2.0, Scrapy, SAP CCA, SAP PM, SAPUI5, Cognos, Internet of Things, Rural Marketing, Trampolining, Golf, CakePHP, SAP EWM, Web Dynpro, Angular2, Framework7, Arduino, CherryPy, Firebase,SAP C4C, SAP Dashboard, SAP PI, ExpressJS, Design Thinking, Internet Security, PyGTK, Apache Drill, Excel Charts, Elastic Search, Computer Security, Extreme Programming, Behavior Driven Development, Conversion Rate Optimization, SAP Basis, Business Law, Kanban, Erlang, SAP Payroll, ASP.Net WP, PouchDB, MFC, SAP HR, Yii, Clojure, Aurelia, CoffeeScript, CPanel, Laravel, SAP Webi, MS SQL Server, pinterest, Indian Polity, Teradata, Windows10

  54. 10 Websites for Ethical Hacking Tutorial - Free

  55. The Best Questions to Ask in Every Job Interview Round

  56. IT Pros Need More Training on Linux and the Cloud

  57. Robert Half Report Lists the Most In-Demand IT Jobs In 2017

  58. It took Sheryl Sandberg Exactly 2 Sentences to Give the Best Career Advice You'll Hear Today

  59. What Employers Want to Know During Job Interviews

  60. How To Answer 'What's The Lowest Salary You Would Accept?'

  61. Learn ethical hacking from scratch

  62. Technology skills demand accelerates outside the IT department

  63. So You Want to be a Functional Programmer (Part 1)

  64. The 15 most popular computer languages, according to the Facebook for programmers

  65. Why Is JavaScript the Programming Language of the Future? - DZone Web Dev

  66. How to Use Markdown in WordPress to Improve Workflow - Make Tech Easier

  67. Ten Self-Defeating Gestures of Job Candidates

  68. A common job-interview question about money is a trap, and you should never answer it directly

  69. Comparing Struts 1 and 2

  70. IT Salary Survey 2016: Do certifications really help?

  71. IT Salary Survey 2016: Highlights

  72. IT Salary Survey 2016: 10 tech specialties with rising salaries

  73. How to Answer "Tell Me About a Time You Failed" in an Interview

  74. Top 10 Tools for a Free Online Education

  75. 5 Interview Mistakes You Didn't Know You’re Making

  76. The 15 Most Popular Free Online Courses for Professionals

  77. The 15-step guide to nailing any job interview

  78. WebServlet annotation examples

  79. Help - Eclipse Platform

  80. Companies Plan to Hire More Linux Pros

  81. Linux Treasures: 11 Sublime Native Linux Apps That Will Make You Want To Switch

  82. The Ten Best Tech Jobs in America

  83. 15 of the Best Courses on Udemy for Self-Improvement

  84. This 'Smart' Whisky Bottle Must Be Stopped

  85. RadioShack Corporation — Our Company — History — Timeline

  86. IT jobs market booming in the Southwest

  87. What I Wish I Knew When I Started My Career as a Software Developer

  88. How to Negotiate Your Salary When You Don't Have Any Work Experience

  89. Higher education: The university experiment : Nature News & Comment

  90. How To Improve Your Programming Career Opportunities

  91. Google gives students unlimited cloud storage

  92. HTG Explains: What is a File System, and Why Are There So Many of Them?

  93. a_message_from_everyone_to_it_workers

  94. Advice I Wish Someone Had Given Me for My First Job

  95. America Has Hit “Peak Jobs” | TechCrunch

  96. 2013 job watch: Top 11 metro areas for tech jobs

  97. How to Tackle Three of the Toughest Interview Questions

  98. Use the "Embarrassment Test" to Help Make Difficult Decisions

  99. Google Developers Live

  100. 2013 IT salaries: 15 titles getting the biggest pay raises

  101. 12 effective habits of indispensable IT pros

  102. The geek skills challenge: 10 talents worth mastering

  103. Support - Forums - General Forums - CrossOver for free on Wednesday, October... - Discussion of Windows on Mac and Linux

  104. Texas Tech University Libraries :: Lynda.com

  105. Adobe - Adobe Education Store - North America - Adobe Creative Cloud Student and Teacher Edition

  106. The Interview Question That's Always Asked (and How to Nail It)

  107. Java, C, PHP: 15 Programming, IT Skills That Are Thriving on Wall Street

  108. How to Stand Out in an Interview

  109. SecTools.Org Top Network Security Tools

  110. Hacking Videos

  111. The Hardest Job Interview Questions—And How to Ace Them

  112. 100 Best Places to Work in IT 2012 - Computerworld

  113. Outdoor Leadership Programs | Outward Bound

  114. Apply for a Tech Position That Doesn't Exist - Wired How-To Wiki

  115. 200+ Most Common Interview Questions & 1000+ Answers

  116. avoid-a-me-resume-and-avoid-getting-ignored-by-yet-another-employer

  117. Study: Salaries Poised to Rise for Workers With Mobile, Cloud, UI Skills | PCWorld Business Center

  118. What Questions Should I Be Ready to Answer at Just About Any Job Interview?

  119. How to Answer "What Is Your Greatest Weakness?"

  120. Lynda

  121. Three reasons why asking risky questions reduces risk

  122. Pepper Your Resume with a Company's Cultural Keywords to Help Beat the Screeners

  123. 15 things successful CEOs want you to know

  124. CEO: The 5 Things I Look for In a Great Job Interview | LinkedIn

  125. 8 nice text-based applications in Linux ~ Linux and Life

  126. The Strange Birth and Long Life of Unix - IEEE Spectrum

  127. Five Best Online File Storage Services

  128. Occupational Hazards: 7 hot jobs for 2012

  129. Hulu - CNBC Originals: Code Wars - Watch the full episode now.

  130. When passwords attack: the problem with aggressive password policies

  131. 0,2817,2395429,00.asp

  132. 68 great ideas for running a security department

  133. discover-whats-new-in-css-4

  134. 5 Tech Pros Companies Want to Hire | PCWorld

  135. High-speed Ethernet Planning Guide | PCWorld

  136. Web server security

  137. Newegg.com - LIAN LI Lancool PC-K56 Black 0.8 mm SECC, Plastic + Mesh ATX Mid Tower Computer Case

  138. TR's fall 2011 system guide - The Tech Report - Page 1

  139. Choose an Irrelevant Skill When Asked "What Are Your Weaknesses?" in a Job Interview

  140. 10 Cloud Career Skills - PCWorld


  1. Why Wells Fargo plans to pilot its own cryptocurrency

  2. How pharma will soon use blockchain to track your drugs

  3. Why wearables, health records and clinical trials need a blockchain injection

  4. FedEx CIO: It’s time to mandate blockchain for international shipping

  5. How blockchain is becomming the 5G of the payment industry

  6. IBM launches global blockchain-based payments network

  7. The difference between blockchain and a database explained

  8. Blockchain: The complete guide

  9. Sharding: What it is and why many blockchain protocols rely on it

  10. W. Va. says mobile voting via blockchain went smoothly

  11. Blockchain for business: 6 promising pilots

  12. Walmart, Sam’s Club tell suppliers to get on blockchain network

  13. 1. How Blockchain Works

  14. Here's what two executive surveys revealed about blockchain adoption

  15. W. Va. to use blockchain-based mobile app for mid-term voting

  16. What is blockchain? The most disruptive tech in decades

  17. New blockchain ledger will let you sell personal healthcare data

  18. BMW, GM, Ford and Renault launch blockchain research group for automotive industry

  19. Blockchain growth makes developers a hot commodity

  20. Will privacy be a stumbling block for blockchain?

  21. Someone wrote a kids' book to explain bitcoin and blockchain

  22. Can Blockchain Fix the Opioid Epidemic? Intel Wants to Find Out

  23. Hackers steal over $150,000 in cryptocurrency with DNS scam

  24. How blockchain can give readers more power on the internet

  25. Explainer: What is a blockchain?

  26. Bank Of America Seeks Patent On Blockchain-Based Data Storage System

  27. Blockchain to ‘radically’ transform anti-fraud, anti-money-laundering efforts

  28. How blockchain could solve the internet privacy problem

  29. Google will soon bring a blockchain-like system to the cloud

  30. Startup Xage Launches Blockchain-Protected IIoT Security

  31. IFTF: Blockchain Futures Lab

  32. Why Blockchain Will Serve New IT Purposes in 2018

  33. As blockchain heats up, so do job prospects for devs

  34. UpNest Featured in ABC 6 News

  35. 5 ways blockchain is the new business collaboration tool

  36. IBM sees blockchain as ready for government use

  37. Looking To Integrate Blockchain Into Your Business? Here's How

  38. Looking To Integrate Blockchain Into Your Business? Here's How

  39. Microsoft to test blockchain-based self-sovereign ID system

  40. Blockchain: The Complete Guide

  41. How blockchain can secure the IoT

  42. Blockchain - Wikipedia

  43. The Basics of Blockchain Technology, Explained in Plain English

  44. How Amazon Is Quietly Entering The Blockchain And Cryptocurrency Boom

  45. Blockchain and cryptocurrency may soon underpin cloud storage

  46. What Is Blockchain?


  1. The evolution of Apple's iPhone

  2. 11 reasons I'm buying an Apple iPhone 11 Pro instead of a Samsung Galaxy Note 10 Plus | ZDNet

  3. iPhone 11, 11 Pro and 11 Pro Max specs vs. iPhone XR, XS and XS Max: What's new and different

  4. Apple will release iOS 13 and watchOS 6 on September 19, macOS Catalina in October

  5. Apple iPhone event 2019

  6. Wikipedia, World of Warcraft Downed By Weekend DDoS Attacks

  7. European regulators to Microsoft: We’re watching you

  8. Apple, Foxconn Broke a Chinese Labor Law to Build Latest iPhones

  9. Samsung Just Announced Its Most Astonishing Product Yet, and It's a Great Example of How to Recover From Failure

  10. McDonald's Just Made a Truly Stunning Change to Its Menu. (There's Only 1 Little Problem)

  11. Unprecedented Cyberattack Hit the US Power Grid

  12. Lime brings electric scooter Group Ride option to US so you'll stop riding tandem - Electrek

  13. Google can’t fix the Android update problem

  14. How to Access Google's Secret Easter Eggs in Android 9 and Android 10

  15. 14 easy ways to cut back on data use in Android

  16. Millions of Android phones vulnerable to phishing attacks | SC Media

  17. Roku Debuts a Soundbar, and It Comes With a Roku Built In

  18. USB4 gets final approval, offers Ethernet-like speed

  19. Hackers Ask for $5.3 Million Ransom, Turn Down $400k, Get Nothing

  20. Here's every way Samsung fixed the Galaxy Fold

  21. https://www.wired.com/story/android-10-best-new-features/

  22. A Mass Cyberattack on more that 100,000 iPhones Just Reported. Here's How To Protect Yourself.

  23. What You Need To Know About U.S. Election Security And Voting Machines

  24. 5G won't replace 4G: Debunking all the 5G myths

  25. Airlines Are Banning MacBooks in Checked Luggage Regardless of Recall Status

  26. Video, reports of machines automatically changing votes in Mississippi GOP Governor runoff

  27. WSJ News Exclusive | National-Security Concerns Threaten Undersea Data Link Backed by Google, Facebook

  28. Instagram phishing scam uses fake 2FA code to appear trustworthy

  29. Disney Plus: Disney's streaming service opens preorders at a big discount

  30. Downloads – Oracle VM VirtualBox

  31. How Amazon convinces police to sign up with Ring

  32. Rockville Center School District pays $88,000 ransom | SC Media

  33. YouTube adds labels to videos w/ public, government funding - 9to5Google

  34. Employees connect nuclear plant to the internet so they can mine cryptocurrency | ZDNet

  35. Amazon's Ring wants police to keep these surveillance details from you

  36. Anti-surveillance clothes foil cameras by making you look like a car

  37. Google Nest cameras won't let you turn off light that shows you're recording

  38. U.S. Carried Out Cyberattacks on Iran

  39. A Guide to Using Tor on Android: Apps, Privacy, and More | Drippler - Apps, Games, News, Updates & Accessories

  40. Exclusive: Google Is Banning A Play Store Developer With More Than Half A Billion App Installs

  41. I consistently recommend smartphones from a company that few in the US have ever heard of over Apple's iPhones or Samsung's Galaxy phones — this is why

  42. Best Android antivirus? The top 12 tools

  43. Ransomware ravages municipalities nationwide this week | SC Media

  44. 13 signs your software project may be doomed

  45. Galaxy Fold loss could help other foldable phones

  46. Essential traits of business-driven IT leaders

  47. Thousands of leaked Facebook documents show Mark Zuckerberg as ‘master of leverage’ in plan to trade user data

  48. Microsoft Email Hack Shows the Lurking Danger of Customer Support

  49. Hands-on with the Samsung Galaxy Fold: more than just a concept

  50. Apple’s latest iMacs are fast and familiar

  51. 15 Months of Fresh Hell Inside Facebook

  52. Amazon’s Alexa isn’t just AI — thousands of humans are listening

  53. How AI Data Actually Moves from Collection to Algorithm

  54. Your next car may not allow you to speed on the highway

  55. 'Exodus' Spyware Posed as a Legit iOS App

  56. Facebook is still tracking you after you deactivate your account

  57. Larry Sanger wants Everipedia to be a post-truth Wikipedia

  58. Massive bank app security holes: You might want to go back to that money under the mattress tactic

  59. 74 Facebook groups for cybercriminals found | SC Media

  60. Airbnb Guests Find Hidden Camera Live-Streaming Their Stay

  61. Verizon flips on 5G for phones in parts of Chicago and Minneapolis

  62. Elizabeth Warren introduces bill that could hold tech execs responsible for data breaches

  63. These Chinese hackers tricked Tesla's Autopilot into suddenly switching lanes

  64. Google begins shutting down its failed Google+ social network

  65. Why did Apple kill its AirPower wireless charger?

  66. WhatsApp launches fact-check service to fight fake news during...

  67. This free team collaboration app is changing how teams work together

  68. Georgia Tech stung with 1.3 million-person data breach | SC Media

  69. New Intel Chip Bug Can Expose All Data on a Computer to Hackers

  70. Facebook Had an Incredibly Busy Weekend

  71. Android security report confirms the two best ways to stay safe

  72. usaa-pilots-iot-technology-to-detect-need-forhome.html

  73. HTTPS Isn't Always As Secure As It Seems

  74. Apple News

  75. Apple Launches TV App, Credit Card, Subscription Services

  76. 6 secrets to CISO job longevity

  77. How Cloud Environments Will Evolve During Next Few Years

  78. Safety-Obsessed Volvo Goes After Distracted, Speedy Drivers

  79. Just Wait Until Cars and Cities Start Talking Amongst Themselves

  80. Facebook’s blockchain cryptocurrency could mean big money – and kill 'fake news'

  81. The death of the VPN - It’s time to say goodbye | SC Media

  82. New York Times CEO warns publishers ahead of Apple news launch

  83. UPS plans to deliver vaccine-toting nurses to your doorstep

  84. You Need to Protect Your Website Against Formjacking Right Now

  85. Don't Kill Rogue Cloud Accounts, Embrace Them

  86. CTO view: the convergence of information and operation technology

  87. Report: Downed 737s Lacked Two Safety Features Because Boeing Charged Extra for Them

  88. Facebook’s leaked moderation rules show why Big Tech can’t police hate speech

  89. Google’s upcoming Pixel 4 and Pixel 4 XL look stunning in these new renders

  90. Microsoft announces Xbox Live for any iOS or Android game

  91. This Big Facebook Critic Fears Tech’s Business Model

  92. The Huawei Case Is Part of a New US–China Cold War Over Tech

  93. Please, for the Love of God, Make Sure You Delete Things Properly

  94. Samsung Could Kill the TV Power Cable Forever

  95. Samsung Working on Two More Foldable Smartphones

  96. Alphabet’s Chronicle finally reveals its cybersecurity moonshot

  97. CMS hackers focus on WordPress | SC Media

  98. IRS warns of new tax-related phishing scams | SC Media

  99. What is Mimikatz? And how this password-stealing tool works

  100. Google Glass’ second-gen enterprise model leaks with updated specs and USB-C

  101. Windows by the numbers: Windows 7 is one obstinate OS

  102. Hack Brief: Google Reveals 'BuggyCow,' a Rare MacOS Zero-Day Vulnerability

  103. 9 biggest hurdles to AI adoption

  104. In the Rush to Join the Smart Home Crowd, Buyers Should Beware

  105. Analysis | The Technology 202: Policymakers sound alarms as Facebook quietly collects sensitive data from apps

  106. A very merry Christmas at Best Buy with sales booming | Fox News

  107. The best new smartphones and gadgets from Mobile World Congress 2019

  108. New FTC task force will take on tech monopolies

  109. The 8 toughest decisions IT leaders face

  110. Facebook working on a new class of semiconductor, AI researcher suggests

  111. Apple and Goldman Sachs are reportedly teaming up to offer a joint credit card

  112. Containers: The pros and cons you may not know about

  113. Smartphone makers are pricing themselves out of the market

  114. HTC Goes All In on Easy-to-Use VR, But Not For Everyone

  115. You Give Apps Sensitive Personal Information. Then They Tell Facebook.

  116. Apple Plans on Combining iPhone, iPad, Mac Apps by 2021

  117. Cogitai Unwraps ‘Self-Learning’ AI Platform for Business

  118. Twitter names first international markets to get checks on political advertisers

  119. Google presents its anti-fake news system in detail

  120. Russian Hackers Go From Foothold to Full-On Breach in 19 Minutes

  121. Six Advantages of Human-aided, 'Artificial' Artificial Intelligence

  122. Microsoft: Russian hackers are trying to influence EU elections

  123. Farmworkers vs robots: Will tomorrow fruit pickers be made of steel and tech?

  124. This Company Takes the Grunt Work Out of Using the Cloud

  125. Serverless: The future of cloud computing?

  126. Facebook Could Pay Multi-Billion Dollar Fine in FTC Settlement

  127. Amazon Bought A Router Company You've Never Heard Of. Here Is Why It's A Huge Deal.

  128. 7 ways to ensure IT gets the credit it deserves

  129. Five ways professionals will experience 5G, and when | ZDNet

  130. Microsoft lampoons Office 2019 in PR pitch for Office 365

  131. 6 secrets of customer-facing CIOs

  132. Full-stack developer: What it is, and how you can become one

  133. Apple's Chinese competitors figured out how to make better Apple products than Apple

  134. This is the best-looking smartphone we've ever seen, even better than the iPhone — take a look

  135. It’s the Real World—With Google Maps Layered on Top

  136. Cybersecurity Workers Scramble to Fix a Post-Shutdown Mess

  137. Amazon Joins Microsoft's Call for Rules on Facial Recognition

  138. How to pick the perfect backpack for your laptop

  139. Someone at Samsung thinks a stylus with a camera is a good idea

  140. This is how Disney is going to compete against Netflix

  141. Remote Desktop Protocol flaws could be exploited to attack RDP clients

  142. Why People Still Don’t Buy Groceries Online

  143. Walmart Grocery

  144. Why It May Be Time to Break Up Facebook

  145. Why Amazon's AWS Cloud Business Will Continue to Grow

  146. Samsung's Galaxy S10 phones will support next-generation WiFi

  147. Ikea's Slow and Steady Plan to Save the Smart Home

  148. Streaming Services Are Beginning To Look Like Cable Companies

  149. The real lesson of Facebook's Apple dust-up shows why Zuckerberg's 'hacker way' is even more dangerous than we thought

  150. Apple Planning Netflix for iOS Games (Report)

  151. How to run Windows 10 on an iPad Pro or on Android

  152. Red Hat Advances Container Technology With Podman 1.0

  153. Apple's services help anchor a company rocked by slow iPhone sales

  154. The world’s most valuable resource is no longer oil, but data

  155. Facebook got caught paying people $20 a month to let them spy on their phones

  156. Data Privacy Improves Business Outcomes, Cisco Finds

  157. How SD-WAN can improve your security strategy

  158. Mark Zuckerberg’s WSJ op-ed was a message to would-be regulators: Hands off our ad business

  159. Checking In? No Thanks. I’m Just Here to Use the Wi-Fi.

  160. Is Big Tech Merging With Big Brother? Kinda Looks Like It

  161. Amazon Go, One Year Old, Has Attracted a Host of Cashierless Imitators

  162. Hulu is cutting the price of its most popular streaming service — and raising the price of its most expensive one

  163. The Waze features you’ve always wanted in Google Maps are finally coming to Android and iPhone

  164. France fines Google nearly $57 million for first major violation of new European privacy regime

  165. Why Did NASA, Lockheed Martin, and Others Spend Millions on This Quantum Computer?

  166. Thanks, Netflix (and Google): You've Just Confirmed Everyone's Worst Fear About the Cloud

  167. Commentary: These Are the Challenges Tech Giants Will Face in 2019

  168. Amazon Ruined Online Shopping

  169. Fool me once...

  170. Predictions 2019: What's in Store for Enterprise Information Practices

  171. Why the Netflix Price Hike Makes Sense

  172. A Sleeping Tesla Driver Highlights Autopilot's Biggest Flaw

  173. Quora breach leaks data on over 100 million users

  174. Robot Janitors Are Coming to Mop Floors at a Walmart Near You

  175. Marriott reveals data breach affecting 500 million hotel guests | ZDNet

  176. Half of all Phishing Sites Now Have the Padlock — Krebs on Security

  177. Marc Zuckerberg, Elon Musk and bitcoin top this year's list of Tech Turkeys

  178. Censored Planet

  179. Russian hackers are trying out this new malware against US and European targets | ZDNet

  180. Retail IoT is still coming into its own in 2019

  181. Amazon’s HQ2 stunt could come back to haunt it

  182. Microsoft launches blockchain development kit

  183. The rare form of machine learning that can spot hackers who have already broken in

  184. How The Wall Street Journal is preparing its journalists to detect deepfakes

  185. Best Antivirus Software and Apps 2018

Cloud Computing

  1. IBM Opens Up Series of Security, AI and Cloud Initiatives

  2. What is a data lake? Flexible big data management explained

  3. 4 hidden cloud computing costs that will get you fired

  4. IT Turning to the Cloud to Handle Growing Big Data Demands

  5. Cloud Storage Comparison 2018: Compare Security & Features

  6. The 3 reasons CIOs have become cloud-first

  7. How Cloud Computing Impacts Corporate Security for Better or Worse

  8. What is cloud computing? Everything you need to know from public and private cloud to software-as-a-service | ZDNet

  9. How the Internet of Things will affect security & privacy

  10. Lima: Your Personal Cloud Storage Review

  11. Opinion: The FCC's Net Neutrality Victory Is Anything But | WIRED

  12. Best practice for using cloud computing in Europe 2013 (Part 1)

  13. 8 questions that will dominate enterprise cloud adoption

  14. Apple iOS 6 iCloud enhancements bring new enterprise problems

  15. Cloud computing is entering its teen years | Digg Technology

  16. VMware's WSX Does Virtual Desktops With HTML5 | Cloudline | Wired.com

  17. Dropbox just integrated with Facebook, making it easy to invite friends to shared folders | Digg Technology

  18. Jolicloud Me to Integrate Content From Multiple Online Services | PCWorld Business Center

  19. Jolicloud Me Delivers Personal Cloud Search, More | Cloudline | Wired.com

  20. What the cloud really means for your IT job

  21. 'Personal Cloud' to Replace PC by 2014, Says Gartner | Cloudline | Wired.com