1. Beware of this sneaky phishing technique now being used in more attacks | ZDNet
  2. Inside the Feds’ Battle Against Huawei
  3. Silicon Valley Abandons the Culture That Made It the Envy of the World
  4. NBCUniversal's streaming service will be called Peacock
  5. Latest AI acquisition shows Apple isn’t sacrificing privacy for smarts
  6. The EU wants to mandate USB-C ports on smartphones
  7. Google makes it easier to sign up for advanced hacking protection
  8. The making of Mojo, AR contact lenses that give your eyes superpowers
  9. Linus Torvalds, creator of the Linux operating system, warned developers not to use an Oracle-owned file system because of the company's 'litigious nature'
  10. UN Secretary-General: US-China Tech Split Worse Than Cold War
  11. Crypto-Gram: January 15, 2020 - Schneier on Security
  12. Why Amazon Pays No Corporate Taxes
  13. Microsoft’s Latest Android Surprise Reveals Future Features
  14. Apple Suddenly Exposes Radical New MacBook Pro Details
  15. Microsoft Faces Immense Pressure After CES Success
  16. CES 2020 Las Vegas - Jan. 7-11
  17. Smartphone Security Surprise As Samsung Shows Google How Android Updates Can Be Done
  18. Meet The Linux Desktop That Wants To Be An Ideal Upgrade For Windows 7 Users
  19. GIMP basics: Best tips and tricks for beginners — PCWorld
  20. Focus Needed Not Just On Drugs But Hospital Expenses To Impact Healthcare Costs
  21. wordpress howto - Google Search
  22. Remember to Delete and Unlink Your Accounts Before Deleting an App
  23. Facebook Says It Will Ban ‘Deepfakes’
  24. How to Secure Your Wi-Fi Router and Protect Your Home Network
  25. These five tech trends will dominate 2020 | ZDNet
  26. 5 Best Managed WordPress Hosting in 2020 Compared (Pros & Cons)
  27. 'Incognito' browsing isn't really private, and 4 other privacy myths
  28. How to use God Mode in Windows 10
  29. 51 Science Fiction Books Everyone Should Read in Their Lifetime
  30. Facebook tracks you offline: How to make it stop
  31. java gui wysiwyg - Google Search
  32. How to Get a Real Google Search Box in Chrome
  33. 2019: The Year Ransomware Feasted on the US Public Sector — PCMag
  34. The 20 Best Books of a Decade That Unmade Genre Fiction
  35. The 24 Absolute Best Movies of the 2010s
  36. How to Make the Switch From Windows to Linux
  37. Filing Your Taxes? Watch Out for Phishing Scams
  38. California is rewriting the rules of the internet. Businesses are scrambling to keep up
  39. How Amazon Makes Its Money
  40. 22 Must-Know Amazon Kindle Tips For Anyone Who Loves To Read
  41. Colleges are turning students’ phones into surveillance machines, tracking the locations of hundreds of thousands
  42. New Security Warning Issued For ‘Tens Of Millions’ Of Smartphone Users [Updated]
  43. Windows 10 Security Warning As Dropbox Zero-Day Is Confirmed
  44. Chinese hacker group caught bypassing 2FA | ZDNet
  45. It Seemed Like a Popular Chat App. It’s Secretly a Spy Tool.
  46. The 14 Best Movies of 2019
  47. You’re not paranoid: Your phone really is listening in
  48. PCMag's Best Products of the Year | PCMag.com
  49. AI Is Biased. Here's How Scientists Are Trying to Fix It
  50. 8 Lesser-Known, Affordable U.S. Vacation Spots for 2020
  51. The 5 Best Sci-Fi and Fantasy TV Shows of 2019
  52. 2020 Kia Stinger Review, Pricing, and Specs
  53. 27 People Who Had A Way, Wayyyyy Worse Year Than You
  54. Learn and Practice SQL With This Game
  55. The dark web could already have your password. How to check
  56. Apple, Google, and Amazon are teaming up to develop an open-source smart home standard
  57. Galaxy Watch Active2
  58. 15 Android Apps Actually Worth Paying For
  59. Dude Protests Annoying Everyday Things With Funny Signs (21 Pics)
  60. AR IN SOCIAL MEDIA: How immersive experiences drive sales, improve customer engagement, and boost awareness
  61. The Chrome Browser Settings You Should Tweak Right Now
  62. 8855 Carroll Lakes Rd Unit 3, Woodland Park, CO 80863 - realtor.com®
  63. Why Ring Doorbells Perfectly Exemplify the IoT Security Crisis
  64. Meet The Linux Desktop OS That Mac And Windows Users Keep Downloading — But Why?
  65. These 32 Things On Amazon Will Seriously Upgrade Your Bedroom For Less Than $30
  66. Google Just Introduced Its Most Helpful Feature Ever, and It Will Forever Change the Way You Travel
  67. The best science podcasts to make you smarter
  68. Microsoft details the most clever phishing techniques it saw in 2019 | ZDNet
  69. Best Buy Bucks the Trend That’s Crushing Other Retailers
  70. Thieves Are Using a New Tactic for Vehicle Break-Ins
  71. Congress to tech firms: Play nice with police on encryption, or else
  72. Google Chrome can now warn you in real time if you're getting phished
  73. In 2020, smart glasses may start looking totally normal
  74. You can now email your emails in Gmail
  75. How Panasonic is using internet honeypots to improve IoT device security | ZDNet
  76. What is a brain-computer interface? Everything you need to know about BCIs, neural interfaces and the future of mind-reading computers | ZDNet
  77. Google Maps tracks everywhere you go. Here's how to automatically delete what it stores
  78. When a DNA Test Says You’re a Younger Man, Who Lives 5,000 Miles Away
  79. If You Have An Amazon Echo Or Google Home, The FBI Has Some Urgent Advice For You
  80. New vulnerability lets attackers sniff or hijack VPN connections | ZDNet
  81. FaceApp Lets You ‘Age’ a Photo by Decades. Does It Also Violate Your Privacy?
  82. FBI warns FaceApp poses 'potential threat'
  83. Google’s Focus mode is out of beta on Android 10 and has arrived on Android 9 Pie phones
  84. Two malicious Python libraries caught stealing SSH and GPG keys | ZDNet
  85. Qualcomm's larger in-screen fingerprint sensor could seriously improve security
  86. Candy Products
  87. The Best VPN Services and Apps of 2019
  88. 4 things laptop buyers waste money on
  89. I Ditched Google for DuckDuckGo. Here's Why You Should Too
  90. EU investigates Google data collection practices
  91. T-Mobile launches first U.S. nationwide 5G network with low-band 600MHz
  92. How blockchain will kill fake news (and four other predictions for 2020)
  93. Private Internet Access VPN to be acquired by malware company founded by former Israeli spy
  94. Linux.com - News For Open Source Professionals
  95. The 25 Most Dangerous Software Vulnerabilities
  96. Manipulating Machine Learning Systems by Manipulating Training Data - Schneier on Security
  97. Hotel front desks are now a hotbed for hackers | ZDNet
  98. Phishing emails are still managing to catch everyone out | ZDNet
  99. A decade of hacking: The most notable cyber-security events of the 2010s | ZDNet
  100. Surveillance on steroids: How A.I. is making Big Brother bigger and brainier | Digital Trends
  101. Electronic waste pileup sparks warnings
  102. Why Sharing Your Disney+ or Netflix Password Is a Bad Idea
  103. How Apple Will Brilliantly Transition to the ARM-Based MacBook | Digital Trends
  104. China Just Weaponized The Smartphone: Here’s Why You Should Be Concerned
  105. Don't Buy Anyone a Ring Camera
  106. Don't fall for these 4 sneaky Black Friday scams
  107. What is Google going to do with your Fitbit data? Anything it likes
  108. The state of AI in 2019
  109. Alexa's Voice Can Now Express Excitement, Disappointment
  110. Firefox 72 to Block 'Fingerprinters' by Default
  111. Google Detects Steady Stream of Phishing Attacks From Cyberspies
  112. Amazon Quietly Reveals Plan to Put Alexa in Almost Everything
  113. The Top Cybersecurity Threats of 2020
  114. How to Protect Yourself After T-Mobile's Big Data Breach
  115. Data breach compromises T-Mobile prepaid accounts
  116. This is Tim Berners-Lee's grand plan to save the web from digital dystopia | ZDNet
  117. Instagram explains how it uses AI to choose content for your Explore tab
  118. GPS Is Easy to Hack, and the U.S. Has No Backup — Scientific American
  119. 1.2 Billion Records Found Exposed Online in a Single Server
  120. The top 20 tech skills of 2019—and the easiest one to learn in 2020
  121. Scammers try a new way to steal online shoppers’ payment-card data
  122. Amazon's smart shelves will re-order office supplies automatically
  123. Sacha Baron Cohen gave the greatest speech on why social networks need to be kept in check | ZDNet
  124. DevOps delivers, but requires new skills - and a whole new mindset | ZDNet
  125. ‘The time is now to have a federal privacy bill,’ says Tim Cook
  126. More than 1 million T-Mobile customers exposed by breach – TechCrunch
  127. How to Back Up and Restore Your iPhone or iPad without iTunes
  128. Absolutely humongous data breach exposes more than a billion records
  129. How to set up a VPN on your iPhone or Android phone: Yes, you need one
  130. Macys.com Magecart attack yields payment, personal info | SC Media
  131. Louisiana spurns attempted ransomware attack, governor says | SC Media
  132. Windows 10 fake update is nasty ransomware
  133. Warning New Amazon Scam
  134. How to Keep Your Disney+ Account From Being Hacked
  135. Amazon says police can keep videos from Ring doorbells forever and share them with anyone
  136. Uber reportedly wants to listen in on your rides by piloting audio recording feature
  137. Google Confirms Android Camera Security Threat: ‘Hundreds Of Millions’ Of Users Affected
  138. What color are these squiggly shapes?
  139. ‘Privacy first’ Brave browser exits beta
  140. Tech jobs: Python programming language and AWS skills demand has exploded | ZDNet
  141. Apple’s 16-inch MacBook Pro has a mysterious new ‘lid angle sensor’
  142. How to Check If You Have Access to Google's RCS Messaging
  143. Every Tech Special Section We've Published So Far
  144. Thousands of hacked Disney+ accounts are already for sale on hacking forums | ZDNet
  145. The Real ID Is Nearly Here, and You Can’t Fly Home Without It
  146. Why Is Google Slow-Walking Its Breakthroughs in AI?
  147. Cybercrime Booms As Scammers Hack Human Nature To Steal Billions
  148. WSJ News Exclusive | AmEx Is Paying Up to Get Businesses to Accept Its Cards
  149. The Supreme Court will hear Google and Oracle’s nearly decade-long copyright fight
  150. Design flaw leaves Bluetooth devices vulnerable | SC Media
  151. Get ahead of the cybersecurity curve | SC Media
  152. Microsoft announces changes to cloud contract terms following EU privacy probe – TechCrunch
  153. WhatsApp fixes bug that would have let hackers exploit devices using MP4 files
  154. New 16-inch MacBook Pro: Teardown reveals old scissor-switch keyboard in all its glory | ZDNet
  155. Secure, Fast & Private Web Browser with Adblocker | Brave Browser
  156. cgermany77 - YouTube
  157. Using NMAP - Part 1 of 2 - Ping Sweeps, Port Scans, IP Spoofing and Gathering Information
  158. Officials warn about the dangers of using public USB charging stations | ZDNet
  159. The Morning After: iFixit looks inside the 16-inch MacBook Pro
  160. MacBook Pro teardown confirms the new keyboard is basically just the old, good keyboard
  161. Galaxy Note 10's best hidden features
  162. 15-inch vs 16-inch MacBook Pro comparison: Should you upgrade? - 9to5Mac
  163. Google’s rollout of RCS chat for all Android users in the US begins today
  164. Iowa paid a security firm to break into a courthouse, then arrested employees when they succeeded
  165. Turn Off Facebook's Camera Privileges on iOS Right Now
  166. Intel Fixes a Security Flaw it Said Was Repaired 6 Months Ago
  167. My Apple Card Got Stolen: Here’s What Happened
  168. Google to offer checking accounts in partnership with banks starting next year – TechCrunch
  169. Why network segmentation is ready for an overhaul | SC Media
  170. Apple’s 16-inch MacBook Pro is here and it has a good keyboard
  171. It’s time to unsubscribe from some streaming services
  172. Download Firefox 70 for Windows, macOS, Linux & Mobile
  173. How much does it cost to launch a cyberattack?
  174. Twitter spy scandal a wake-up call for companies to clean up their data access acts
  175. How to Save Your Data When You Quit Your Job
  176. Engadget's 2019 holiday gift guide is here!
  177. A Secret Apple Project Just Leaked. And Apple Thinks It'll Eventually Replace iPhones
  178. Learn About Cybersecurity with These 11 Essential Videos
  179. 5 steps to a successful red team engagement
  180. How to choose a database for your application
  181. Best Buy Made These Smart Home Gadgets Dumb Again
  182. Twitter is working on a policy to flag deepfakes
  183. Amazon will launch new grocery store as alternative to Whole Foods
  184. The CEO of $67 billion Intuit has a plan to stop AI from killing jobs: Use the machines to make better use of humans
  185. iOS 13 jailbreak tool Checkra1n enters public beta
  186. WSJ News Exclusive | Google’s Secret ‘Project Nightingale’ Gathers Personal Health Data on Millions of Americans
  187. Imaginative attack scenarios elicit intrigue at NYU’s CSAW cyber event
  188. Doctors are testing the use of VR headsets instead of general anaesthetics for young patients | ZDNet
  189. A browser bug was enough to hack an Amazon Echo – TechCrunch
  190. Scammers Are Exploiting a Firefox Bug to Freeze Your Browser
  191. Make Cookie Monster Your Navigation Voice With Waze
  192. New to Mac? Here Are 50+ Keyboard Shortcuts You'll Want to Know!
  193. Google's Fitbit Acquisition Is All About Apple — The Motley Fool
  194. What Keeps NSA Cybersecurity Boss Anne Neuberger Up at Night
  195. 5 ways IT still fails its business users
  196. How to Choose the Right Processor for Your Laptop
  197. He Thought His Phone Was Secure; Then He Lost $24 Million to Hackers
  198. Beat the crowds at these abandoned U.S. national parks
  199. Duck Duck Go offers Mac users even more privacy
  200. The right and wrong way to deliver cybersecurity information | SC Media
  201. Google forms App Defense Alliance | SC Media
  202. If You Use Amazon's Ring Doorbell Devices, Change Your Wifi Password
  203. How Facebook Gets the First Amendment Backward
  204. How to Opt Out of the Sites That Sell Your Personal Data
  205. Stunning Desktop Linux OS Deepin v20 Has A Release Date
  206. Ahead of Merger, T-Mobile Teases Its Cheapest Phone Plan Ever
  207. Apple Issues New Blow To Facebook And Google With This Bold Privacy Move
  208. Bill Gates: You'd all be on Windows Mobile today, not Android, but I screwed up | ZDNet
  209. Law enforcement can plunder DNA profile database, judge rules | ZDNet
  210. 5G brings up questions of cybersecurity vulnerabilities
  211. U.S. Charges Former Twitter Employees With Spying for Saudi Arabia
  212. ISPs lied to Congress to spread confusion about encrypted DNS, Mozilla says
  213. Firefox's Latest Feature Will Make Me Ditch Chrome
  214. Should Tech CEOs Go to Jail Over Data Misuse? Some Senators Say Yes
  215. Welcome! - The Apache HTTP Server Project
  216. Web.com discloses breach affecting customer account info | SC Media
  217. How to stop procrastinating
  218. Hackers breached some of the web's most popular domain registrars
  219. Gmail Inbox Too Full? Here’s How To Clear Out Some Space
  220. On Halloween night, Google discloses Chrome zero-day exploited in the wild | ZDNet
  221. Apple Revenue Rises Even as iPhone Sales Decline
  222. Security firm says Chinese hackers intercepted text messages
  223. Twitter's canny political ad ban costs it little – and piles pressure on Facebook
  224. Facebook is testing encrypted video and audio calls
  225. This New Android Malware Can Survive a Factory Reset
  226. There's an Apple business growing at a 50% clip that's wowing Wall Street analysts
  227. Exclusive: 16-inch MacBook Pro Touch Bar and Touch ID layout confirmed - 9to5Mac
  228. 30 time-saving tricks to try with the new Google Assistant
  229. 31 of the best podcasts for curious minds
  230. We Love Fanny Packs. These Are Our Favorites
  231. How to Download Your Kindle Notes and Highlights and Export Them (Updated for 2019) | The Digital Reader
  232. Bill Hader channels Tom Cruise [DeepFake]
  233. Did Bixby become useful and we all missed it?
  234. Google is making a fundamental change to its search engine, calling the update 'perhaps one of the biggest since the beginning'
  235. Love dark mode? Here’s why you may still want to avoid it
  236. Social Media Has Not Destroyed a Generation — Scientific American
  237. How to Enable Chrome 78's Hidden Dark Mode and Secure Password Features
  238. What Big Tech Could Look Like Under President Elizabeth Warren
  239. Report: Hotel chain modifies bed-facing robots to prevent unwanted spying
  240. How to Pick the Right Roku for Your TV
  241. 2020 may be cybersecurity's "year of the platform"
  242. How to right-click on your iPhone to access shortcuts and other functions
  243. 5 ways to get free access to services like Netflix, HBO, Hulu, Disney Plus, and Apple TV Plus
  244. 8 questions to answer before paying a ransomware demand
  245. Germany's cyber-security agency recommends Firefox as most secure browser | ZDNet
  246. NordVPN and TorGuard VPN Breaches: What You Need to Know
  247. Zuckerberg on Capitol Hill: Lots of Grandstanding, Little Libra Clarity
  248. Google Claims Quantum Computing Achievement, IBM Says Not So Fast
  249. How to turn off Cortana on a Windows 10 computer, so it doesn't take up power and can't hear or respond to your voice
  250. JDK 14: The new features in Java 14
  251. A Tale of Exploitation in Spreadsheet File Conversions | Brett Buerhaus
  252. Avast says hackers breached internal network through compromised VPN profile | ZDNet
  253. friendly interactive shell - Google Search
  254. WIRED's Absolute Favorite Wireless Headphones
  255. Pixel 4 vs. Galaxy Note 10: Biggest letdowns and best killer features
  256. The 36 Best Wildlife Photos Of 2019
  257. Hack Netflix with these add-ons and tricks
  258. 10 hidden tricks every Amazon shopper should know
  259. An Extremely Thorough Guide to This Year’s Flu Season
  260. How the Linux screen tool can save your tasks if SSH is interrupted
  261. How Gmail filters can help organize your inbox
  262. Multiple zero-day vulnerabilities found medical IoT devices: CISA | SC Media
  263. How to Find and Use Google's Brand-New Privacy Tools
  264. The iPhone 11’s Deep Fusion camera arrives with iOS 13.2 developer beta
  265. Barr Pushes Facebook for Access to WhatsApp Messages
  266. The Google Maps feature we’ve been waiting for is finally here
  267. When to Expect Apple's Next Event: 16-Inch MacBook Pro, iPad Pro Refresh, and More?
  268. Amazon bolsters Alexa privacy after user trust takes a hit
  269. iOS 13 and iPadOS: Here's everything you need to know
  270. Facebook will have to give UK police access to encrypted messages, report says
  271. 35 Clever Hacks That'll Save You Money, Time, And Tears
  272. Top 15 hidden features in iOS 13 that you must check out
  273. Why home security signs could actually get you robbed
  274. External hard drive not working with iPad or iPhone using iPadOS or iOS 13?
  275. Hackers looking into injecting card stealing code on routers, rather than websites | ZDNet
  276. The 30 best films of the decade, ranked
  277. How to choose the right smartphone for you
  278. 'Inside Bill's Brain' Calls BS on Malcolm Gladwell's 'Outliers' Theory
  279. 29 Quotes By Keanu Reeves That Will Give You A Different Perspective On Life
  280. The 11 Best New TV Shows Coming This Fall—From 'Watchmen' to 'Mandalorian'
  281. How to erase your personal information from the internet (it’s not impossible!)
  282. linux cyber security videos - Google Search
  283. Creating and using a live installation image :: Fedora Docs Site
  284. 5 signs your security culture is toxic (and 5 ways to fix it)
  285. All your IoT devices are doomed | ZDNet
  286. NSLOOKUP and How It Works With DNS Records
  287. Move over VPN, SDP has arrived
  288. Azure for Education | Microsoft Azure
  289. American Cyber Command hamstrung Iran’s paramilitary force
  290. Galaxy Note 10's best hidden features
  291. How to Perfectly Customize Every Setting on the New Galaxy Note 10
  292. How To Get the Most Out of Your Smartphone Battery
  293. Large Telecoms, State Enforcers Make Pact to Combat Robocalls
  294. Ransomware Attacks Are Testing Resolve of Cities Across America
  295. Get the most out of the Note 10's camera
  296. Facebook’s First Newsroom Imploded. Now It’s Trying Again.
  297. What Happened to Evasi0n.com? - Picozip
  298. Best electric mountain bike 2019: uphill made easy with E-MTB. Downhill is up to you…
  299. 5 ways Amazon Alexa can entertain your bored self
  300. Kaspersky Antivirus Software Exposed Millions to Web Tracking
  301. Why Letting Red Hat Do Its Thing Was Wise Choice by IBM
  302. Apple Card Review: The Credit Card of the Future Is No Card At All
  303. The Amazon Publishing Juggernaut
  304. Apple reveals special new iPhones for security researchers
  305. The 50 Best TV Shows on Netflix Right Now
  306. College Still Pays Off, but Not for Everyone
  307. We keep falling for phishing emails, and Google just revealed why
  308. Map reveals which cities use Ring's surveillance network to spy on you
  309. Google Warning: Tens Of Millions Of Android Phones Come Preloaded With Dangerous Malware
  310. Getting the best Wi-Fi speeds at home? Check the fine print
  311. Unsubscribe
  312. Three useful, yet neglected, SQL statements
  313. 35 Cheap Things That’ll Help Fix The Small Annoyances In Your Life
  314. Domino’s Pizza delivers a game-changing case to the US Supreme Court
  315. How the Accused Capital One Hacker Stole Reams of Data From the Cloud
  316. A dismal industry: The unsustainable burden of cybersecurity | ZDNet
  317. This hacker will trick you, and you'll be glad she did
  318. FBI, ICE find state driver’s license photos are a gold mine for facial-recognition searches
  319. Wi-Fi 6 is fast enough to download 22 Marvel movies in 3 hours
  320. Capital One looked to the cloud for security. But its own firewall couldn’t stop a hacker.
  321. Google's New Gesture Controls Aren't Just for the Pixel
  322. Apple put an iPhone in everybody's pocket — now its growth depends on putting devices all over our bodies
  323. The Alleged Capital One Hacker Didn't Cover Her Tracks
  324. Seattle woman charged in Capital One breach may have data from other companies
  325. An Operating System Bug Exposes 200 Million Critical Devices
  326. Researchers to launch intentionally ‘vulnerable’ blockchain at Black Hat
  327. What's a smart contract (and how does it work)?
  328. Websites using Facebook 'Like' button liable for data, Europe's top court decides
  329. Upcoming iPhone update will change how you browse online
  330. Should You Use a VPN for Internet Privacy? That Depends, Experts Say
  331. How To Make Sure Websites Aren’t Spying On You: Guide To Three Popular Browsers | Def Pen
  332. Plex makes piracy just another streaming service
  333. The Amazon dilemma: how a tech powerhouse that fulfills our every consumer need still lets us down
  334. 5 Ways Reading Can Change Your Life (and Best Practices)
  335. IT’s soft skills shortage — and how to train up for success
  336. Getting help for Linux shell built-ins
  337. Banner vulnerability allows remote access to records of more than 60 colleges | SC Media
  338. No More Ransom project has prevented ransomware profits of at least $108 million | ZDNet
  339. 15 extremely useful Gmail shortcuts you'll want to know
  340. How to efficiently charge your devices
  341. Fix your phone's horrible signal strength
  342. Electronic Recycling Guide
  343. Watch Out for This Amazon Prime Day Scam
  344. Why are people so hostile towards President Donald Trump? - Quora
  345. Facebook now shows you who uploaded and shared your information for other advertisers to target you
  346. Which smart speaker is perfect for you?
  347. More than 1,000 Android apps harvest data even after you deny permissions
  348. How to Protect Our Kids' Data and Privacy
  349. Sunday Night Is the New Monday Morning, and Workers Are Miserable
  350. Trick those #!@% spam calls with a fake phone number
  351. Perspective | All eight Spider-Man movies, ranked from worst to best
  352. A Costly Reminder That You Don't Own Those Ebooks
  353. How a trivial cell phone hack is ruining lives
  354. If you can only buy one, should it be the MacBook Pro or the iPad Pro?
  355. A hacker assault left mobile carriers open to network shutdown
  356. Quantum computers will break today's internet security. This work could help fix it
  357. The best programming language to learn
  358. EU-US Privacy Shield legal showdown now set for July 9 – TechCrunch
  359. Samsung’s deepfake technology is getting scary
  360. This Reddit Thread Of "Guy Secrets" Is Equal Parts Hilarious And Heartfelt
  361. Review | Google Chrome has become surveillance software. It’s time to switch.
  362. Warning Issued For Apple's 1.4 Billion iPad And iPhone Users
  363. Samsung Galaxy Note 10 could have a new laptop-thrashing trick up its sleeve
  364. The best and worst of smart home tech for one injured vet
  365. International Dark Sky Places
  366. You're Probably Doing 2FA Wrong: Here's the Right Way
  367. Robin Williams hilarious interview
  368. AWS chief says facial recognition should be regulated
  369. You can now use your Android phone as a 2FA security key for Google accounts on iOS
  370. Apple: iPad's now the best PC for more people
  371. Inside the farm of the future
  372. What’s the best iPad Pro keyboard?
  373. How one romance scammer built an international phishing operation | ZDNet
  374. Much @Stake: The Band of Hackers That Defined an Era
  375. Apple finally kills off iTunes
  376. If China Really Wants to Retaliate, It Will Target Apple
  377. This ID Scanner Company is Collecting Sensitive Data on Millions of Bargoers
  378. All the Ways Google Tracks You—And How to Stop It
  379. Newly Released Amazon Patent Shows Just How Much Creepier Alexa Can Get
  380. Perspective | It’s the middle of the night. Do you know who your iPhone is talking to?
  381. Why I (Still) Love Tech: In Defense of a Difficult Industry — WIRED
  382. Google Is Making Android As Difficult To Hack As iPhone—And Cops Are Suffering
  383. Amazon Prime Video Channels: Everything you need to know
  384. Samsung deepfake AI could fabricate a video clip of you from a single photo
  385. Political Parties Still Have Cybersecurity Hygiene Problems
  386. Remember Google keeps a list of everything you buy – and here's how to find it
  387. How Tech Companies Are Shaping the Rules Governing AI
  388. How to use Google Maps to help someone find you
  389. Want one of the best paid entry-level jobs? Learn this 20-year-old programming language | ZDNet
  390. Perspectives: We're getting closer to stopping tech giants like Apple from abusing their power
  391. The One Password Tip Everyone Needs to Know
  392. San Francisco becomes first city to bar police from using facial recognition
  393. What is phishing? How this cyber attack works and how to prevent it
  394. Keanu Reeves Leaves Colbert Speechless With An Incredible Reflection On Death
  395. How to ditch your iPhone for Android—and take your files with you
  396. Wi-Fi 6: Better, faster and... kind of like Goro from Mortal Kombat?
  397. Limit How Long Google Keeps Your Data With This Overdue Setting
  398. Hands On With Google's Nest Hub Max Smart Display
  399. Hey, Google, let's drive: How you'll use the new Assistant Driving Mode for Android phones
  400. Google brings AR and Lens closer to the future of search
  401. Google’s next-gen Assistant is 10x faster and knows where your mom lives
  402. 9 Apps You Should Have on Your iPhone
  403. What Amazon knows about you
  404. When Coding Is Criminal
  405. Chinese humanoid robot turns on the charm in Shanghai
  406. Facebook has told federal investigators it’s open to heightened oversight of its privacy practices
  407. Facebook Building Cryptocurrency-Based Payments System
  408. Facebook
  409. The stupid reason Apple is using to try to stop you from fixing your own iPhone | ZDNet
  410. Google Pixel 3 owners are still facing problems 6 months later, here’s the list
  411. Google adds way to auto-delete your location history, web activity
  412. Best Android antivirus? The top 9 tools
  413. Pickup-bicycle collision on UT road raises broad liability issues
  414. NSA asks to end mass phone surveillance
  415. There's nothing funny about today's marijuana. It killed my son
  416. Amazon Prime two-day shipping will go down to one day
  417. The WIRED Guide to Open Source Software
  418. Coming to store shelves: cameras that guess your age and sex
  419. How Nest, designed to keep intruders out of people’s homes, effectively allowed hackers to get in
  420. Apple 'plotted' to hurt Qualcomm years before it sued the company
  421. Facebook’s privacy woes have a price tag: $3 billion or more
  422. Assume breach is for losers: These steps will stop data breaches
  423. NY Cyber Fellowship | NYU Tandon School of Engineering
  424. How New York City plans to become a cybersecurity hub
  425. 3 things about cloud and IoT you need to consider
  426. The 9 Best Macintosh WYSIWYG Editors
  427. AT&T’s 5G E marketing ploy is turning out to be a disaster
  428. Don't Praise the Sri Lankan Government for Blocking Facebook
  429. A 'Blockchain Bandit' Is Guessing Private Keys and Scoring Millions
  430. Amazon opens Key delivery to garages – TechCrunch
  431. Opinion | The Only Answer Is Less Internet
  432. Facebook leaks: Zuckerberg turned data into dollars in ruthless battle with competitors
  433. Samsung Delays Launch Of $2,000 Folding Phone After Reviewers Find Broken Screens
  434. Galaxy Note 10: Rumors, price, release date, specs and everything else
  435. How to Maximize Your Kindle’s Battery (and Really Get a Month of Reading)
  436. Facebook really doesn't seem to understand privacy or security
  437. Cyberspies Hijacked the Internet Domains of Entire Countries
  438. Walmart and Google forge voice order alliance to battle Amazon | ZDNet
  439. End of an era: Soon smart speakers will outnumber tablets | ZDNet
  440. People Wearing AirPods Are Making Things Awkward For Everyone Else
  441. How to remap Bixby to Google Assistant on the Samsung Galaxy S10, Note 9, and other One UI devices
  442. Samsung's Galaxy Fold Phones Are Already Breaking
  443. The Coming Obsolescence of Animal Meat
  444. j.mp/drippler_app
  445. Google’s hybrid cloud platform is coming to AWS and Azure
  446. In a world of Google and Amazon, libraries rethink their role
  447. Report: Samsung will release four Galaxy Note 10 models, both 4G and 5G options
  448. Robots, VR and 3D printers are served up at this high-tech library
  449. Einstein's theory was put to the test. Guess what happened
  450. Review | Die, robocalls, die: A how-to guide to stop spammers and exact revenge
  451. Is More Knowledge Making Us Less Reasonable?
  452. The Day the Dinosaurs Died
  453. Change is not difficult. We make it difficult
  454. Old, Online, And Fed On Lies: How An Aging Population Will Reshape The Internet
  455. Profiting Off The Explosive Growth In Artificial Intelligence And Robotic Automation
  456. Amazon’s Rise in Ad Searches Dents Google’s Dominance
  457. Tenants worry smart-home tech could be abused by landlords
  458. r/cvsreceipts
  459. Reap the Promise of One and Done Authentication With SSO
  460. Trends in the Information Technology sector
  461. 38 Gmail Tips That Will Help You Conquer Email
  462. One week with Apple News Plus: a messy but good-enough Netflix for magazines
  463. Mark Zuckerberg says Facebook may pay publishers to put their stuff in a dedicated news section
  464. South Korean websites hit with rare waterhole phishing scheme | SC Media
  465. Watch every Marvel movie *and* show in the perfect order
  466. 4 obstacles to ethical AI (and how to address them)
  467. Read the latest headlines in the Apple News app
  468. The secret tricks Apple store staff use to push certain products | ZDNet
  469. Steven Spielberg's push against Netflix at Oscars hits nerve
  470. 3 things you must include in an IoT security plan
  471. Verizon Pledges Home Internet on Its 5G Rollout
  472. Why are TVs so cheap now? Well, your smart TV is watching you and making extra money, too
  473. Samsung’s One UI is the best software it’s ever put on a smartphone
  474. Apple just made it easier to find and manage subscriptions in iOS
  475. Here's the One Gmail Setting You Should Activate Now
  476. How to stay as private as possible on Apple's iPad and iPhone
  477. With Magic Leap, your entertainment may get real weird real quick
  478. The Linux command-line cheat sheet
  479. The Next 7 Steps in Convergence of Technology, Business—and Humanity
  480. Google's Making It Easier to Encrypt Even Cheap Android Phones
  481. Phishing emails imitate American banks to infect victims with TrickBot
  482. Tech Is Splitting the U.S. Work Force in Two
  483. Why cloud computing suddenly seems so hard and expensive
  484. Coming soon: On-premises 5G gear for enterprises
  485. Prepping the Enterprise for the AI Apocalypse - InformationWeek
  486. Amazon Eases Into Self-Driving Tech By Joining Aurora's $530 Million Funding Surge
  487. iPhone 7, iPhone 8 being modified for German market following Qualcomm patent trial win
  488. How to get more from Terminal and use it to control your Mac
  489. Why CAPTCHAs have gotten so difficult
  490. Microsoft CEO Says Privacy a Basic Human Right, Calls for Global GDPR
  491. Tesla to buy energy tech company Maxwell Technologies for about $218 million
  492. A New Google Chrome Extension Will Detect Your Unsafe Passwords
  493. Apple, the iPhone, and the Innovator’s Dilemma
  494. Google’s new Android apps listen to the world for the hard of hearing
  495. Why is Java programming popular for businesses?
  496. Top Tech Trends In 2019: 11 Experts Detail What You Need To Watch
  497. 10 cybersecurity trends to watch for 2019
  498. Abstinence-Only Sex Education Has A Big Unintended Consequence In Conservative States
  499. $145 million funds frozen after death of cryptocurrency exchange admin | ZDNet
  500. This password-stealing phishing attack comes disguised as a fake meeting request from the boss | ZDNet
  501. The Ten Most Ridiculous Things "On the Blockchain"
  502. Met Police deploys live facial recognition technology for ninth time
  503. Six Trends for 2019 That Will Redefine Enterprise Tech
  504. Where’s Apple’s collaboration service?
  505. How to run a successful IT internship program
  506. Opinion | Unless You’re Oprah, ‘Be Yourself’ Is Terrible Advice.
  507. How to Rearrange the Menu Bar on the Mac - TekRevue
  508. The autonomous vehicle parking problem
  509. What to expect from tomorrow’s big net neutrality court hearing
  510. Inside the Pentagon’s race against deepfake videos
  511. Google Takes Its First Steps Toward Killing the URL
  512. Is My Cell Phone Carrier Throttling My Speed?
  513. Samsung Starts Making First 1TB Flash Storage for Phones
  514. AMD turns to TSMC after GlobalFoundries turns back on 7nm chips
  515. Could fingerprint scanners replace check-in lines at airports, baseball games and hospitals?
  516. AT&T Wants to Be Big in Entertainment. First, It Has a $49 Billion Problem to Fix
  517. Expect more requests to subscribe from Apple on iPhones and iPads
  518. New Mac Malware Uses Steganography to Sneak Into Computers - ExtremeTech
  519. Commands to help you monitor activity on your Linux server
  520. Have Phones Become Boring? Well, They’re About to Get Weird
  521. Other apps will be able to use Brave's privacy-focused ads starting later this year
  522. Getting Started with Java 9 Module System - Help | IntelliJ IDEA
  523. What is the program modules in java?
  524. Understanding Java 9 Modules
  525. What is digital forensics? And how to land a job in this hot field
  526. Zuckerberg Plans to Integrate WhatsApp, Instagram and Facebook Messenger
  527. Apple is bringing "Hey Siri" to second generation AirPods
  528. World Economic Forum warns of AI’s potential to worsen global inequality
  529. Amazon-owned Ring has reportedly been spying on customer camera feeds
  530. As the Government Shutdown Drags on, Security Risks Intensify
  531. Major security flaw found in popular ES File Explorer Android app
  532. How to choose a photo storage service
  533. The foldable smartphone revolution will be awkward, but essential
  534. The World’s Worst Passwords List: How Many Do You Have?
  535. U.S. proposes to allow drone operation at night, over people
  536. Feds Can't Force You To Unlock Your iPhone With Finger Or Face, Judge Rules
  537. The Strange History of One of the Internet's First Viral Videos
  538. T-Mobile starts verifying callers to fight spam
  539. IBM Unveils Latest System in Its Quantum Computing Lineup
  540. A Worldwide Hacking Spree Uses DNS Trickery to Nab Data
  541. A neural network can learn to organize the world it sees into concepts—just like we do
  542. New Linux Systemd security holes uncovered | ZDNet
  543. Germany Decides Amazon Dash Buttons Break the Law
  544. Get a Password Manager. No More Excuses
  545. Check out all the smart home products at CES 2019
  546. Biometric Security Can Be Hacked, but It's Really Hard to Do
  547. Best security software, 2019: Lab-tested reviews of today's top tools
  548. Cybersecurity trends in 2018 | SC Media
  549. What Enterprises Can Expect for Cybersecurity in 2019
  550. Best Cloud Backup Services 2019
  551. Blockchain Can Wrest the Internet From Corporations' Grasp
  552. 11 Meditation Apps to Help You Relax, De-Stress
  553. Chrome Remote Desktop: The easy way to access a remote computer
  554. 24 hidden iPhone settings you should know about
  555. Why It's Hard to Escape Amazon's Long Reach
  556. Q&A: Experian exec says biometrics won’t save you from mobile hacks
  557. Tor Is Easier Than Ever. Time to Give It a Try
  558. 24 hidden Android settings you should know about
  559. Android file transfer: The no-fuss way to connect your phone and computer
  560. How to back up everything on Android | AndroidPIT
  561. Transform your phone with the best Android lock screen apps | AndroidPIT
  562. Facebook's and social media's fight against fake news may get tougher
  563. 'Secret sharing' system keeps your personal data safe - Futurity
  564. Is Buddhism a Philosophy or a Religion?
  565. AT&T Plans to Put 5G Labels On Non-5G Phones
  566. We've Got the Screen Time Debate All Wrong. Let's Fix It
  567. RDP Man-in-the-Middle - Smile! You're on Camera - GoSecure
  568. 12 'best practices' IT should avoid at all costs
  569. How to Stop Apps From Tracking Your Location
  570. Ambient computing is in the air
  571. Inside the world of AI that forges beautiful art and terrifying deepfakes
  572. The Best iPad Cases
  573. ‘Donald’ Was One of the Worst Passwords You Used in 2018
  574. ​MS-Linux? Lindows? Could Microsoft release a desktop Linux? | ZDNet
  575. How You Hold the Steering Wheel Could Seriously Injure You in a Crash
  576. The WIRED Guide to Data Breaches
  577. Nest Hello vs. Ring Video Doorbell Pro: Why Nest Wins
  578. The Race Is On to Protect Data From the Next Leap in Computers. And China Has the Lead.
  579. How to get VPN protection for your laptop while using a smartphone Wi-Fi hotspot | ZDNet
  580. The best VPN services: Our 10 favorite vendors for protecting your privacy 2 - Page 2 | ZDNet
  581. Social Security calling? Nope, it's just scammers out to grab your cash
  582. Quantum computers pose a security threat that we’re still totally unprepared for
  583. Inside Chronicle, Alphabet’s cybersecurity moonshot
  584. The best streaming video player to buy right now
  585. What to Do After a Data Breach: A Step-by-Step Guide
  586. How to Download Anything on the Web for Free: 12 Tips and Tools | Drippler - Apps, Games, News, Updates & Accessories
  587. Three challenges facing blockchain technology
  588. Here’s a controversial view: 5 reasons why the Internet of Things is doomed
  589. This guy found a way to run Apple's Mac software on an iPad — and it works surprisingly well
  590. Hackers are opening SMB ports on routers so they can infect PCs with NSA malware | ZDNet
  591. The 1996 law that made the web is in the crosshairs
  592. How to protect yourself from cell phone phishing attacks | Drippler - Apps, Games, News, Updates & Accessories
  593. 'Amazon will fail. Amazon will go bankrupt': Jeff Bezos makes surprise admission about Amazon’s lifespan
  594. The Best Android Tablets of 2018


  1. How to Automatically Delete Your Google Data, and Why You Should
  2. How to use Gmail labels to tame your inbox
  3. How to Create an RSS Feed from a Google Alert
  4. How to Tap Your Network and See Everything That Happens On It
  5. Storing your stuff securely in the cloud
  6. Trading in your smartphone could be a 'ticking time bomb' for your personal data — here's how one expert says you can protect yourself
  7. How to Control the Privacy of Your Facebook, Instagram, Twitter, and Snapchat Posts
  8. Charge your devices the right way
  9. How to Spring Clean Your Digital Clutter to Protect Yourself
  10. When You Electronically Sign Documents, Always Keep a Copy
  11. How to freeze and lock your Linux system (and why you would want to)
  12. How to Set up a Used Mac When You Don't Know the User Name or Password
  13. How to check if you've been hacked
  14. How to safely open any USB device
  15. You don't need a new computer, here's how to keep your old one running like new
  16. Workstation Pro - VMware Products : Windows Virtualization for Everyone
  17. Linux on your laptop: A closer look at EFI boot options | ZDNet
  18. How to remap the Bixby button on most recent Samsung Galaxy devices! | Drippler - Apps, Games, News, Updates & Accessories
  19. 12+ essential iPad productivity tips
  20. Outlook vs. Gmail: Which works better for business?
  21. G Suite now lets users work with Google Docs, Sheets, and Slides directly inside Dropbox
  22. How to manage your Linux environment
  23. MyEclipse Learning Center - Genuitec
  24. How to create Servlet in MyEclipse IDE - javatpoint
  25. Two-Factor Authentication: Who Has It and How to Set It Up
  26. A short collection of Safari tips for iPhones, iPad
  27. How to Turn Off Email Trackers
  28. Here's how to securely wipe your Android smartphone for resale | ZDNet
  29. Famed Hacker Kevin Mitnick Shows You How to Go Invisible Online
  30. How to use your Mac safely in public places
  31. How to use the SwiftKey Keyboard
  32. Zipping files on Linux: the many variations and how to use them
  33. SQL tutorial: Learn SQL on MariaDB
  34. These secret settings instantly make any Android phone feel twice as fast
  35. How to See Which Facebook Advertisers Have Your Info
  36. How to Lock Down What Websites Can Access on Your Computer
  37. How To Stop Robocalls From Bothering You
  38. How to Set Up a Fake Phone Number
  39. Compiling and Installing - Apache HTTP Server Version 2.4
  40. 10 essential MySQL tools for admins
  41. bash howto debug - Google Search
  42. How to Get the Most Out of Gmail’s New Features
  43. Google’s light search app Go can now read you articles and web pages
  44. Gmail Update Helps Protect Businesses from Phishing, BEC Threats
  45. How to Protect Your Identity, Personal Data and Property
  46. Get the Fastest Wifi on Your Wireless Network With Wifi Explorer for Mac
  47. Learn Basic Javascript For Free With This Google App
  48. Build Free Databases
  49. How to build your own Alexa skills with the new Alexa Blueprints
  50. MySQL :: Download MySQL Community Server
  51. MySQL :: MySQL 5.7 Reference Manual :: B.5.3.2 How to Reset the Root Password
  52. Google Keeps a Record of Your ENTIRE Search History
  53. How to Manage Your Google Privacy Settings
  54. How to Check If Cambridge Analytica Could Access Your Facebook Data
  55. Get the Most Out of Your Kindle iOS App
  56. Want to Learn More About Computers? Try Building Your Own PC
  57. How to Manage All of Facebook's Privacy and Security Settings
  58. How to Group Mac App Icons More Prominently in Your Dock
  59. Google Lens Now Available for iOS: How to Get It
  60. Android Oreo: 18 advanced tips and tricks
  61. Here’s how you access the super creepy data Facebook has on you
  62. 12 tips to free up storage space on your Android phone or tablet | Drippler - Apps, Games, News, Updates & Accessories
  63. Constant Field Values (Java Platform SE 6)
  64. New Feature In Google Drive Improves Interoperability with Microsoft Office
  65. Top 32 Nmap Command Examples For Linux Sys/Network Admins - nixCraft
  66. How To Recover Linux Grub Boot Loader Password - nixCraft
  67. Cortana explained: How to use Microsoft's virtual assistant for business
  68. The Cognitive Biases That Convince You the World Is Falling Apart
  69. What is IFTTT? How to use If This, Then That services
  70. How to Keep Your Home Wi-Fi Safe From Hackers
  71. Ditch Your Smartphone Keyboard For Gboard
  72. How to Install Packages with Homebrew for OS X
  73. How to Customize Your Android Phone Exactly How You Like It
  74. How to Delete the Voice Data That Amazon Echo and Google Home Are Storing
  75. VMware shared folders - Google Search
  76. VirtualBox share folders - Google Search
  77. How to tweak the new Firefox 57 Quantum browser to suit your preferences | ZDNet
  78. How to Send Email to Any Cell Phone (for Free)
  79. build a computer - Google Search
  80. How to install or compile GIMP filters/plugins/extensions on Linux
  81. New Theory Cracks Open the Black Box of Deep Neural Networks
  82. How to Download Your Kindle Notes and Highlights and Export Them | The Digital Reader
  83. How to Stop Hackers From Ransoming Your Mac or iPhone [Updated]
  84. How to Turn Off App Ratings Requests in iOS 11
  85. Install Fedora Linux in Just 10 Steps
  86. Must-have Wi-Fi troubleshooting and management tools
  87. The Complete Guide to Speeding Up Your Virtual Machines
  88. IFTTT / Incompatible Browser
  89. IFTTT / Incompatible Browser
  90. Transfer Photos from Android to Mac OS X
  91. How to Create Shareable Download Links for Files on Google Drive
  92. 14 Practical Examples of Linux Find Command for Beginners
  93. The Best Keyboard Shortcuts for Bash (aka the Linux and macOS Terminal)
  94. How to install Bash shell command-line tool on Windows 10
  95. How to Snoop-Proof Any Phone or Tablet
  96. How to make the dock the most powerful part of your launcher | Drippler - Apps, Games, News, Updates & Accessories
  97. How to install Ansible on Apple MacOS X using command line
  98. Here's how to access the iPhone's hidden mode that turns the camera into a magnifying glass
  99. The Privacy Enthusiast's Guide to Using Android
  100. A Guide to Getting Past Customs With Your Digital Privacy Intact
  101. The travel-only Gmail account: A practical proposal for digital privacy at the US border
  102. Want to Sharpen Your Focus? Science Says to Drop These 5 Habits
  103. How to legally cross a US (or other) border without surrendering your data and passwords
  104. How to stop seeing your Amazon searches everywhere
  105. Vim Editor Modes Explained
  106. Automatic Backup in Linux using bash script / Linux data backup solution
  107. How to Schedule Tasks in Linux with Cron and Crontab
  108. How to Schedule Tasks on Linux: An Introduction to Crontab Files
  109. Quick HOWTO : Ch14 : Linux Firewalls Using iptables - Linux Home Networking
  110. Linux Server Security and Linux Network Security and How To Use Snort Intrusion Detection
  111. How to See Other Devices Logged in to Your Google Account
  112. How to Create a Bootable Backup of Your Entire Mac on an External Drive
  113. Hack Like a Pro: How to Secretly Hack Into, Switch On, & Watch Anyone's Webcam Remotely « Null Byte
  114. Stop HTML5 autoplay videos in Chrome, Firefox, Opera (but not Edge, Explorer, Safari) | PCWorld
  115. How to Unlock Your Phone Without Pressing the Home Button | TIME
  116. There's a hidden map in your iPhone of everywhere you've been
  117. 4 Great Firefox Addons For Anonymous Surfing and Improved Privacy - Make Tech Easier
  118. How to Start a WordPress Blog - Make Tech Easier
  119. Unlock the Hidden Power of Preview to Better Manage PDF Files [Mac] - Make Tech Easier
  120. How to Make a Bootable macOS Sierra USB Flash Drive
  121. Escaping from Zip Ties
  122. Easily Edit Documents with PDF Expert 2.0 for Mac
  123. How to Fix iOS 10's Biggest Annoyances
  124. Neural networks are powerful thanks to physics, not math
  125. 7 Tips and Tricks for Google Maps on Android - Make Tech Easier
  126. How to Add Blank Spaces to Your Mac's Dock - Make Tech Easier
  127. DeskDock shares your computer's mouse and keyboard with your Android device | Drippler - Apps, Games, News, Updates & Accessories
  128. 39 Brilliant Camping Hacks To Try On Your Next Trip
  129. How to Tame Your Negative Talk in Your Mind
  130. How To Use Google Photo Service in 7 Steps
  131. The Best Wireless Routers of 2016
  132. Convert File Formats on Linux with FF Multi Converter
  133. 10 Super Efficient Ways Inbox by Gmail Saves You Time
  134. 25 Google Search Hacks to Make Life Easier
  135. How to Remove a Service From the Context Menu on Mac
  136. 7 Creative Uses for Amazon Echo and Alexa
  137. How to Change the Launchpad Layout on Your Mac
  138. How to Hide the Menu Bar in OS X El Capitan
  139. 4 Tips to Make Your Mac Run Faster
  140. The Beginner's Guide to Creating Virtual Machines with VirtualBox
  141. How to install WordPress with Apache, MariaDB and PHP 7 on Arch Linux
  142. Linux Mint: The right way to react to a security breach | ZDNet
  143. How to Use a USB Flash Drive with Your Android Phone or Tablet
  144. symless/synergy
  145. 5 Favorite Ways to Collect Content in Evernote
  146. 11 Advanced Searches To Bookmark To Become A Google Power User
  147. Convert Virtual Machines from VMware to VirtualBox
  148. Evernote Can Encrypt Bits of Text to Keep Your Notes Private
  149. 15 Things You Didn’t Know You Could Do with Dropbox
  150. 4 very common Macbook problems—and how to fix them
  151. How to Play DVDs and Blu-rays on Linux
  152. How To Use a USB Stick To Securely Log In to Gmail
  153. How To Move Emails From One Gmail Account To Another
  154. How to see all the companies tracking you on Facebook — and block them
  155. How to use multi-app multitasking on the iPad Pro
  156. How to track your Linux laptop
  157. 10 of the best network and server monitoring tools
  158. Trim Will Find Your Subscriptions, Cancel Those You No Longer Want
  159. How to Play Classic Retro Games on Android
  160. Setting Up IP and Port Based Virtualhost Apache
  161. How to Activate GodMode in Windows 10
  162. How to do image steganography on Linux
  163. How to Export or Save All Pictures from MMS Text Messages on Android
  164. How to Enable and Use iCloud Drive on Your iPhone or iPad
  165. How to trigger commands on File/Directory changes with Incron on Debian
  166. How to Download YouTube Movies & Music on Android | Drippler - Apps, Games, News, Updates & Accessories
  167. 3 Powerful New Features to Try in iOS 9 | PCMag.com
  168. iOS 9 Hack: How to Access Private Photos and Contacts Without a Passcode
  169. Who gives the best advice about password security? | Naked Security
  170. How to Make a Program Run at Startup on Any Computer
  171. How to Save Google Maps Offline | PCMag.com
  172. How to Make Cool Gmail Signatures Right from Google Drive
  173. How to Convert Any File Format Online with Free Tools
  174. Collecting Ubuntu Linux System Information
  175. How to Mount a NTFS Drive on CentOS / RHEL / Scientific Linux
  176. How to Create Windows 10 USB Installer in Mac
  177. Google Classroom Launches Chrome Extension So Teachers Can Instantly Share Links With The Entire Class | TechCrunch
  178. Here are the best Gmail hacks to keep you on track
  179. Get the Best of MakeUseOf with Our New Android App, and Win a Samsung Galaxy S6 Edge!
  180. How to Fully Control Your Android Device from Any Computer | Drippler - Apps, Games, News, Updates & Accessories
  181. How and Why to Encrypt Your Text Messages
  182. How to monitor your system performance on (Ubuntu) Linux
  183. How To Organize Your Apps Using LaunchPad in OS X
  184. How to Encrypt and Decrypt Files on an Android Device
  185. The only technique to learn something new
  186. The ultimate guide to staying anonymous and protecting your privacy online - Slideshow | ExtremeTech
  187. Amazon's voice-guided speaker juggles your IFTTT tasks
  188. IFTTT Recipes That Help You Save Money
  189. 5 secret ways you can control your phone using Google search on your computer | Drippler - Apps, Games, News, Updates & Accessories
  190. Snap and edit pictures like a pro with these great Android photo apps | Drippler - Apps, Games, News, Updates & Accessories
  191. 9 Amazing ES File Explorer Features That Can Replace Other Android Apps | Drippler - Apps, Games, News, Updates & Accessories
  192. Here’s How to Download and Delete What Google Knows About You
  193. Use Your Mac’s Notification Center for Widgets, Scripts, and Notifications
  194. How to Enable CMD + n Shortcuts in Safari for Easy Tab Switching
  195. Securing tomcat - OWASP
  196. 4 "About:Config" Tricks to Extend The Functionality Of Firefox
  197. If you lose your Android phone, just Google 'Find My Phone' and it will
  198. Easily Create KVM Virtual Machines on Linux With GNOME Boxes
  199. How to Install Hardware Drivers on Linux
  200. How to Remove Bloatware on Android Without Rooting
  201. HiddenMe Hides all Your Mac Desktop Icons in One Click
  202. How to Use Your Mac’s Disk Utility to Partition, Wipe, Repair, Restore, and Copy Drives
  203. How to Convert a Physical Windows or Linux PC to a Virtual Machine
  204. How to Clear Your Dropbox Cache in Windows and Linux
  205. Configuration Mania Adds a Ton of Hidden Options to Firefox
  206. 6 Tricks You Can Use To Increase The Range Of Your Home Wi-Fi Router
  207. Five tips for cleaning and speeding up your Mac - CNET
  208. How to Disable Your Webcam (and Why You Should)
  209. Why You Really Want a Linux Virtual Server Instead of a Private Server
  210. How to Safely Share Your Smartphone, Computer, or Tablet With a Guest
  211. Google quietly backs away from encrypting new Lollipop devices by default | Ars Technica
  212. How to monitor server log files with Logwatch on Debian and Ubuntu
  213. Singapore’s Lee Kong Chian School of Medicine develops curriculum across time zones, with help from Dropbox for Business
  214. Review: Ring Video Doorbell | WIRED
  215. Featured: Top 10 Backup Apps For Android | Drippler - Apps, Games, News, Updates & Accessories
  216. Kindlebox Automatically Sends Books from Dropbox to Your Kindle
  217. Use Manual Refresh to Save Battery Life on Any Tablet or Smartphone
  218. What To Do If You Lose the Master Password to Your Password Manager
  219. Anyone With Your Mac Can Bypass Your Password Unless You Do This
  220. 4 tips to keep your business data private
  221. How to Make Macs and iOS Devices Work Together Seamlessly with Continuity
  222. Easily Share Files Between Windows 7, 8 and Mac OS X
  223. How to Use Bluetooth File Transfer Between OS X and Android 5.0 Devices
  224. Using secure shell (ssh) for login and secure copy (scp) for data transfer on Linux
  225. The Best Built-In Mac Tips You've Never Heard of, According to Reddit
  226. Everything You Can Do to Free up Space on Your Mac
  227. 4 Things You Didn't Know You Could Do With Google Earth Pro
  228. Repair Linux Boot failures in Grub 2 rescue mode
  229. How to Make a Smart Home From a Dumb One | PCMag.com
  230. How to Run a Full Linux Desktop in a Browser Tab on Your Chromebook
  231. ifttt Review & Rating | PCMag.com
  232. How to install Django on Ubuntu 14.04
  233. GRUB 2 boot menu basics and how to add a custom splash image
  234. 3 Common SQL Mistakes You are Probably Making as a Java Developer | DZone
  235. How to Power Up OS X's Spotlight with Flashlight
  236. 22 tips, tricks and shortcuts for Android Lollipop
  237. How to Anonymize Everything You Do Online | WIRED
  238. How to configure an NFS server and mount NFS shares on Ubuntu 14.10 | HowtoForge - Linux Howtos and Tutorials
  239. How do You Password Protect a Folder on Linux/Unix without Encryption?
  240. How to Unlock Hidden Settings In Your Favorite Software
  241. Learn to Build Android Apps with This Curated Collection of Courses
  242. Your Mac Logs Everything You Download, Here's How to Clear It Out
  243. Beginner's Electronics: 10 Skills You Need to Know
  244. Apple releases web tool to deregister phone numbers from iMessage | The Verge
  245. How to Find and Remove Duplicate Files on Mac OS X
  246. How To Safely Store A Password | codahale.com
  247. How Inbox by Gmail Works, and How to Use It for More Productive Email
  248. How to Use Handbrake to Convert Any Video File to Any Format
  249. How to Identify and Solve your Android Battery Problems | Drippler - Apps, Games, News, Updates & Accessories
  250. Hands On With Google Inbox: Useful Email Triage Tools For A Mobile Workflow | TechCrunch
  251. Useful SystemD commands (hints for systemctl or systemctl vs chkconfig and service)
  252. I Want to Write Android Apps. Where Do I Start?
  253. How to configure a host intrusion detection system on CentOS - Xmodulo
  254. Secure Your Linux Desktop and SSH Login Using Two Factor Google Authentication
  255. How to Organize Your Linux File System for Clutter-Free Folders | Linux.com
  256. mamp - Google Search
  257. How to Set Up Family Sharing in iOS 8 | News & Opinion | PCMag.com
  258. How to Save the Net | Magazine | WIRED
  259. DIY NAS: EconoNAS 2014
  260. The Apps You Need to Deauthenticate Before Selling Your Devices
  261. Plan Your Free Online Education at Lifehacker U: Fall Semester 2014
  262. How to make your email address as hard to guess as your password
  263. Stop Thieves From Recovering Your Data After A Factory Reset
  264. Creating Bibliographies & Footnote Citations Is Easier With Bookends for Mac
  265. How To Install Tomcat On CentOS 7 | HowtoForge - Linux Howtos and Tutorials
  266. 7 Tips For Less Terrible Smartphone Photos
  267. How to Easily Encrypt Files on Windows, Linux, and Mac OS X
  268. Troubleshoot Your Mac With These Hidden Startup Options
  269. ISC Diary | Stop, Drop and File Carve
  270. Evernote Food Saves, Organizes, and Helps You Find Great New Recipes
  271. How to create a VPN shortcut in OS X | MacFixIt - CNET Reviews
  272. What to Do (If Anything) About a Cluttered OS X Desktop | Gadget Lab | Wired.com
  273. Google Drive Blog: Bringing people together in Drive
  274. The Best Experimental Chrome Features You Should Check Out
  275. Use nettop command to check per-application network activity in OS X | MacFixIt - CNET Reviews
  276. Use OS X Finder shortcuts in Open and Save dialog boxes | MacFixIt - CNET Reviews
  277. Mac OS X Easter Eggs - Business Insider
  278. Give Your Laptop and Smartphone a Spring Cleaning
  279. How to Set Up Your Own Private Cloud Storage Service in Five Minutes with OwnCloud
  280. ISC Diary | The HTTP "Range" Header
  281. Multiboot Linux distributions from one USB key - LinuxBSDos.com
  282. How to Make Windows 8 Look and Feel Like Windows 7
  283. Mac Remote Controls Your Mac from the Comfort of Your Android Phone or Tablet
  284. Apple Adds Two-Factor Authentication to Apple ID, Here's How to Set It Up
  285. How to Boot Into Linux from Your Android Phone
  286. Instantly Hide Any File in OS X by Putting It In Your Library Folder
  287. Apache Tomcat 6 Installation on OS X 10.7 Lion and Eclipse Integration | Whatta-Whatta
  288. Cool User File Systems, Part 1: SSHFS | Linux Magazine
  289. What To Do After You've Been Hacked | Gadget Lab | Wired.com
  290. Nova Launcher
  291. How to install Google Play Store apk & Launcher on Kindle Fire HD/2
  292. [ROOT] How To: Root the Kindle Fire 7" HD or 2 with Linux/MAC - Noob (Simple) Version - xda-developers
  293. Make Your Own Pocket-Sized, Grid-It-Style Organizer for $2.50
  294. Daemonize a bash Script
  295. Linux Daemon Writing HOWTO
  296. How to Create a Strong Password in Wake of Twitter Hack Episode - CIO.com
  297. Hackers release iOS 6.1 jailbreak utility - Network World
  298. Build a Computer This Weekend
  299. Encrypt Your Data With EncFS (Fedora 18) | HowtoForge - Linux Howtos and Tutorials
  300. Turn a Raspberry Pi into a Personal VPN for Secure Browsing Anywhere You Go
  301. Video: The Philips uWand Is All I Want in a Smart TV Remote Control | Gadget Lab | Wired.com
  302. Learn Beginner and Advanced HTML/CSS Skills for Free
  303. Five Best Desktop Media Servers
  304. review-linux-live-usb-creator-makes-it-easier-to-install-linux.html
  305. This Is the Best of Lifehacker 2012
  306. Most Popular How-To Guides of 2012
  307. Set Up a Raspberry Pi as a Personal Web Server
  308. Automatically Create Evernote Template Notebooks with AppleScript
  309. Five Best Deal Sites
  310. MySQL 5.5 Admin Cheat Sheet from DZone Refcardz - Free, professional tutorial guides for developers
  311. The Perfect Desktop - Ubuntu 12.10 (Quantal Quetzal) | HowtoForge - Linux Howtos and Tutorials
  312. iPhone 5 Setup and Security Guide
  313. How to Secure and Encrypt Your Web Browsing on Public Networks (with Hamachi and Privoxy)
  314. Inotify: Efficient, Real-Time Linux File System Event Monitoring
  315. Remote MySQL Performance And Query Monitoring | HowtoForge - Linux Howtos and Tutorials
  316. http://www.networkworld.com/research/2012/110612-pc-security-your-essential-software-264010.html
  317. Turning the smartphone from a telephone into a tricorder | ExtremeTech
  318. Lifehacker.com Updates: QuickLock Is A Better Way To Lock Your Mac
  319. 20 Linux Server Hardening Security Tips
  320. Coffee Table Pi
  321. How to install Google's Chrome OS | ZDNet
  322. When You Need to Remember Something You Can't Write Down, Think of Something Crazy
  323. PSA: The Dot In Your Gmail Address Doesn’t Matter | TechCrunch
  324. Sleeping On Difficult Problems Actually Helps Solve Them
  325. Amazon's Remote Wipe of Customer's Kindle Highlights Perils of DRM | Gadget Lab | Wired.com
  326. Insync - Your Google Docs backup and sync tool
  327. how_to_adjust_settings_in_vlc_to_permanently
  328. How to Break Into a Mac (And Prevent It from Happening to You)
  329. The Ultimate Beginner's Guide To AppleScript | Mactuts+
  330. HTC Security Flaw Found on Multiple Android Phones
  331. iPhone, iOS 6 Apps to Monitor Your Network, Find WiFi
  332. Making Your own Custom Linux Distro - YouTube
  333. How do I select which folders to sync to my computer?
  334. Site44 Creates Web Sites from Dropbox Folders, Perfect for Personal Landing Pages and Resumes
  335. SSH tip: Send commands remotely | MacFixIt - CNET Reviews
  336. freedesktop.org - Software/systemd/FrequentlyAskedQuestions
  337. Lock down your social media with essential security add-ons | PCWorld
  338. If Your Android Phone Is Stolen, This App Photographs the Thief - Yahoo! News
  339. How a Secret Sequence of Doorbell Buzzes Can Unlock Your Home With
  340. [SAMSUNG GALAXY S3 QCOM TOOLKIT V2.3] Drivers Backup Root CWM BusyBox + MORE [SPR] - xda-developers
  341. Cracked! Hacker Claims to Jailbreak the iPhone 5. - Mike Isaac - Mobile - AllThingsD
  342. How to add and arrange Home screens on the Galaxy S3 | Android Central
  343. How to Root U.S. and Canada Galaxy S3 SGH-T999/SGH-I747/SPH-L710! [Fail-Proof][Noob-Proof][U.S. Cellular] | GalaxyS3Root.com
  344. Here's the List of iOS 6 Compatible Jailbreak Tweaks
  345. Kindle Fire HD 7-inch rooted in spite of Amazon, unstoppable force meets the unhackable object (video) -- Engadget
  346. How to root the Sprint Galaxy S3 L710 without increasing flash counter
  347. [VIDEO] How to Root the Amazon Kindle Fire HD Tablet - xda-developers
  348. Managing Multiple MySQL Servers From One phpMyAdmin Installation (Using SSL Encryption) | HowtoForge - Linux Howtos and Tutorials
  349. Get Google and iOS Living Together in Perfect Harmony
  350. WiFi Pineapple Mark IV | jwz
  351. HakShop — WiFi Pineapple Mark IV
  352. Got a BMW? Thicko thieves can EASILY NICK IT with $30 box • The Register
  353. Customizable Shortcuts for Firefox Lets You Create Key Commands for Anything
  354. Google releases new Java to iOS source code translator -- Engadget
  355. Evernote For Education: Citelighter Teams Up With Cengage To Take The Pain Out Of Online Research | TechCrunch
  356. How to quickly create an encrypted archive in OS X | MacFixIt - CNET Reviews
  357. Computer Hacking/Security Testing with BackTrack5
  358. Spec Comparison: Apple's iPhone 5 vs. Samsung Galaxy S3 - The Mac Observer
  359. Installing Apache2 With PHP5 And MySQL Support On OpenSUSE 12.2 (LAMP) | HowtoForge - Linux Howtos and Tutorials
  360. Backtrack 5 : How to Bypass Antivirus and Hack Window Systems / SET – (Tutorial) « Connection Reset By Peer
  361. Lifehacker top 10 News, Videos, Reviews and Gossip - Lifehacker
  362. Videos | Tenable Network Security
  363. Tenable Network Security: Enabling Nessus on BackTrack 5 - The Official Guide
  364. Pinpointing Your Security Risks - IT Security
  365. How to create and use Live USB - FedoraProject
  366. Turn Any Laptop Into a Money-Saving Wi-Fi Hotspot For Your Hotel Room
  367. 18 great IT tools for Android
  368. Norton Utilities 15 Review & Rating | PCMag.com
  369. Welcome to SecurityTube.net
  370. Parallels Desktop 8 and VMWare Fusion 5 announced | MacFixIt - CNET Reviews
  371. Learn to Code a Basic iPhone App
  372. How to Dual Boot Linux on Your Mac and Take Back Your Powerhouse Apple Hardware
  373. The Twilight Desktop
  374. iBuildApp :: Create Free iPhone App Using Online Interface Builder| Android, iPad
  375. How Technology Helps Keep This 3,000-Student Class Engaged | Digg Technology
  376. Delete Dropbox cache to recover drive space | Macworld
  377. Master MySQL in the Amazon Cloud | PCWorld Business Center
  378. Pick the right shutter speed for every photographic situation | Macworld
  379. Why Mosh is better than SSH? - LinuxScrew: Linux Blog
  380. Speed Up Dropbox's File Syncing with a Simple Tweak
  381. How to hack your own Wi-Fi network
  382. Just Show Me: How to read Microsoft Office files on your Kindle Fire | Technology News Blog - Yahoo! News
  383. Easily Shake The Eggshells Off A Bunch of Boiled Eggs
  384. The Best Online Backup App for OS X
  385. How to Customize Any Folder or App Icon Using Any Image in OS X
  386. Review: 7 password managers for Windows, Mac OS X, iOS, and Android
  387. 16 ultimate SSH hacks
  388. Sync iPad to Multiple Computers - Guides of Syncing iPad with Multiple Computers - StumbleUpon
  389. how to hack video screens on times square - YouTube
  390. Thanks, Dev-Team! New iPad Already Jailbroken [Updated] | PCWorld
  391. Tweaking Lion's firewall | Macworld
  392. USB Outlet Quattro-”the Gadget Plug”
  393. Read Later Brings Instapaper, Read It Later to Your Mac's Desktop
  394. How to Create a Custom Theme for Your WordPress Blog with Minimal Coding Required
  395. Sync Files and Folders Outside Your My Dropbox Folder
  396. CyberKiko | Dropbox and multiple sync folders
  397. Ubuntu for Android | Ubuntu
  398. Creating A Portable MySQL On CentOS 6 And Ubuntu 11.10 Linux From Sources | HowtoForge - Linux Howtos and Tutorials
  399. Secrets
  400. Mac OS X Lion — Changing SSHD port | .: A Blog To Be Named Later :.
  401. See How SugarSync Stacks up to the Competition - SugarSync
  402. File Sync & Online Backup - Access and File Sharing from Any Device - SugarSync
  403. MyEclipse UML | Eclipse UML diagrams | UML Modeling Capabilities :: MyEclipse
  404. my_laptop_was_stolen_but_dropbox_is_running_and_i
  405. The MacPorts Project -- Download & Installation
  406. Ten OS X Command Line Utilities you might not know about
  407. Handy Mac OSX Command Line Tricks | Snipe.Net
  408. How to Crack WPA2 WPS WiFi password
  409. 6 Ways to Defend Against Drive-by Downloads | PCWorld
  410. macosx - Full guide for installing tomcat on OS X - Server Fault
  411. How To: Upgrade a Wall Outlet to USB Functionality
  412. Changing Apache Server Name To Whatever You Want With mod_security On Debian 6 | HowtoForge - Linux Howtos and Tutorials
  413. Pimp Your Facebook: How to Create a Badass Timeline Banner
  414. Four ways to make the Dock more powerful | Macworld
  415. MySQL Reference for OS X
  416. 14 Practical Ways to Use Evernote
  417. How to Unlock Padlocks Without a Key Using Cheap DIY Shims
  418. SSH tricks
  419. Pro Tips for Regular People: Five Photography Tricks Anyone Who Owns a Camera Should Know
  420. How to Roll Your Own Awesome Drag-and-Drop File Sharing Service
  421. diary.html
  422. Five Best Ways to Stream Live TV
  423. WiFi garage door opener makes forgotten keys a thing of the past - Hack a Day
  424. How to use your iPad or iPhone as a second monitor — Mac Tips
  425. Be a Grown Up Boy Scout: The Wilderness Survival Skills Everyone Should Know
  426. Using Bash To Output To Screen And File At The Same Time
  427. AssistantExtensions Is an All-In-One Siri Hack Manager
  428. MyEclipse UML Tutorial
  429. De-Mystifying the Dark Corners of Windows: The Registry, DLLs, and More Explained
  430. How To Maintain and Use Collaborative Grocery Lists
  431. Remove Unnecessary System Preferences Icons in OS X to Simplify Your Settings
  432. Everything You Thought You Knew About Learning Is Wrong | GeekDad | Wired.com
  433. How To Install Siri on iPad 2 -Video
  434. My Top 10 Jailbreak Tweaks
  435. The Best Wi-Fi Articles for Securing Your Network and Optimizing Your Router
  436. 7 Things I Learned From Building My First Desktop PC | PCWorld
  437. Install A Hard Drive Or SSD In Your Notebook's Optical Bay : Tiered Storage In A Single-Bay Notebook
  438. Evi one-ups Siri for iOS and Android
  439. How to Build a (Nearly) Hack-Proof Password System with LastPass and a Thumb Drive
  440. Online Tool Converts JavaScript Bookmarklets into Chrome Extensions | PCWorld
  441. Deleting Files Within Lion's Applications Folder | PCWorld
  442. iPhone 4S and iPad 2 Finally Get Proper, Untethered Jailbreaks
  443. The Always Up-to-Date Guide to Jailbreaking Your iPhone, iPod touch, and iPad [iOS 5.0.1]
  444. Going Google-Free: The Best Alternatives to Google Services on the Web
  445. Installing Apache2 With PHP5 And MySQL Support On Fedora 16 (LAMP) | HowtoForge - Linux Howtos and Tutorials
  446. 7 Essential CSS3 Tutorials For Web Developers | Digg Technology
  447. MiniPwner Is a Cheap Penetration Tester and Portable Wi-Fi Node
  448. 35 MacGyver Tips, Clever Uses, and Other Life Hacks in One Infographic
  449. How to Prevent WordPress Site From SQL Injection Attack
  450. Performance Upgrades; FireWire USB SATA Storage; Memory, more at OWC
  451. Apple - OS X Lion Recovery - Introducing Lion Recovery
  452. Troubleshooting: My computer won't turn on
  453. iMac G5: How to Reset the SMU
  454. The Best Jailbreak Apps for iOS 5
  455. Add a Custom Message to Your Mac OS X Login Screen to Help People Contact You If Your Mac is Lost
  456. How to Boost Your Reading Comprehension by Reading Smarter and More Conscientiously
  457. EncFS 1.7.4 installer for Mac OS X available - BoxCryptor Blog
  458. Encrypted Filesystem for Mac OS X
  459. Best of Lifehacker 2011 News, Videos, Reviews and Gossip - Lifehacker
  460. Five Best Video Editors
  461. The Best System Tweaker for Linux
  462. External desktop hard drives buying guide | Macworld
  463. File Management Apps : How and Why to Root your Android: 15 Worthwhile Apps
  464. How to Root Kindle Fire for Mac OSX or Linux! | RootKindleFire.com
  465. The Get More Out of Google Infographic Summarizes Online Research Tricks for Students
  466. Finally, Some Privacy! Cool LCD Monitor Hack Helps Keep Your Secrets | PCWorld
  467. How to Choose A Cloud Storage Provider: Security - storage Blog
  468. Headphones buying guide | Macworld
  469. Best SSDs For The Money: November 2011 : Best SSDs For The Money: November Updates
  470. Macs, Kindle Fire, and managing files | Macworld
  471. Best Chrome Extensions
  472. Virtualization With KVM On Ubuntu 11.10 | HowtoForge - Linux Howtos and Tutorials
  473. Download a Free Dynamic DNS Update client for your dynamic IP
  474. How to Fix Your Family’s Computer This Holiday So the Rest of the Year Is Easy
  475. How to Securely Wipe Your Data from Any Phone on Any Platform
  476. How to Improve Your iPhone's Battery Life
  477. Enabling and disabling cookies | How to | Firefox Help
  478. Disable AutoRun to Stop 50% of Windows Malware Threats
  479. Apple’s Cloud-Based Music Service Now Live On iTunes | Gadget Lab | Wired.com
  480. HOWTO: SSH Tunneling Made Easy
  481. ArchBang Brings Arch Linux's Greatest Features to Your PC Without the Stressful Installation
  482. How to Make (and Sustain) a Good First Impression Every Time
  483. How to Use Photoshop to Pop Pimples, Change Facial Expressions, and Alter Reality As We Know It
  484. abyssoft - teleport
  485. Apache/NCSA Custom Log Format
  486. Best 5 monitors for professionals | Crave - CNET
  487. 5 More PC Upgrade Mistakes (And How To Avoid Them) | PCWorld
  488. Synergy
  489. Replace Your Keychain w/Technology, Convenience, & Style - Keyport Slide and Blades | Keyport, Inc.
  490. iOS 5 Shortcut Feature Enables A Hilarious Prank
  491. Microsoft Lync client for Linux ~ MyTricks
  492. Compare directories via diff - Mac OS X Hints
  493. Five Best Disk Defragmentation Tools
  494. How to Crack a Wi-Fi Network's WEP Password with BackTrack
  495. Top 10 Ways to Unlock the Unlockable
  496. WinX DVD Ripper Platinum Preview | PCMag.com
  497. How to Break Into a Windows PC (and Prevent It from Happening to You)
  498. Making UEFI Secure Boot Work With Open Platforms | The Linux Foundation
  499. A Guide to Sniffing Out Passwords and Cookies (and How to Protect Yourself Against It)
  500. A Guide to Sniffing Out Passwords and Cookies (and How to Protect Yourself Against It)
  501. What to Do When You've Forgotten Your Smartphone's Passcode
  502. How to bypass the iPad 2 password in five seconds : technology
  503. A Gadget for the Home Learns by Degrees - Katherine Boehret - The Digital Solution - AllThingsD
  504. Bump Key HOWTO
  505. Silence Noisy Neighbors by Transmitting Your Music to Their Speakers
  506. Pick Locks - Wired How-To Wiki
  507. The Perfect Desktop - Ubuntu 11.10 (Oneiric Ocelot) | HowtoForge - Linux Howtos and Tutorials
  508. Installing Apache2 With PHP5 And MySQL Support On Ubuntu 11.10 (LAMP) | HowtoForge - Linux Howtos and Tutorials
  509. TonidoPlug - Tiny, Low Power, Low Cost, Linux Home Server | Access your files, music and media from anywhere
  510. More ways to move data to a new Mac
  511. Groovy - Home
  512. Learn How to Pick Locks from a Competitive Lockpicker Who Truly Loves Locks
  513. BackTrack Wiki
  514. The Best Disk Cloning App for Mac OS X
  515. Spool Is Instapaper On Steroids | TechCrunch
  516. Open Security Screws with a Rotary Tool
  517. The Always Up-To-Date Guide to Rooting Any Android Phone
  518. Synapse Is a Super-Fast, Tightly Integrated Application Launcher for Linux
  519. Cartoonify Photos with the GIMP
  520. What Settings Should I Change on My Wi-Fi Router? [Ask Lifehacker]


  1. 5 keys to protect your supply chain from cyberattacks
  2. NCR blocked Mint, Quickbooks after attackers take over, drain accounts | SC Media
  3. IBM: Face Recognition Tech Should be Regulated, Not Banned | SecurityWeek.Com
  4. Alexa, Siri, Google Assistant smart speakers – they're all open to remote laser attacks | ZDNet
  5. Greed is good... for this phishing scam | SC Media
  6. Russia Tests New Disinformation Tactics in Africa to Expand Influence
  7. Perspective | What is fingerprinting? The online tracking you can’t avoid.
  8. Facebook sues surveillance tool provider and hosts of hacking websites
  9. Data breach causes 10 percent of small businesses to shutter | SC Media
  10. Cyber awareness starts with vulnerability awareness | SC Media
  11. Stop ignoring printer security: It's time for CSOs to take control
  12. What Is Tor and How Does Onion Routing Protect Privacy?
  13. Amazon Just Announced an Incredible New Feature That Most People Are Going to Love. There's Only 1 (Pretty Big) Problem
  14. UN, NGOs targeted by ongoing phishing attack | SC Media
  15. Cyber defense is a team sport -- Train accordingly | SC Media
  16. 5 reasons users hate cybersecurity awareness training, and how to make them love it
  17. A scam targeting Americans over the phone has resulted in millions of dollars lost to hackers. Don't be the next victim.
  18. Why Keybase Doesn't Offer Two Factor Authentication
  19. U.S. Government, Military Personnel Data Leaked By Autoclerk
  20. Adobe exposed nearly 7.5 million Creative Cloud accounts to the public
  21. How 18 Malware Apps Snuck Into Apple's App Store
  22. Why Keybase Doesn't Offer Two Factor Authentication
  23. Phishing alert: This fake email about a bank payment delivers trojan malware | ZDNet
  24. Tips for those of all ages interested in pursuing a career in cybersecurity | SC Media
  25. IT pros go back to school to advance their careers
  26. Top cloud security controls you should be using
  27. Equifax allegedly used insecure password "admin" to protect portal
  28. It's Time to Outsource Your Passwords to an App
  29. Alexa and Google Home devices leveraged to phish and eavesdrop on users, again | ZDNet
  30. 10 risk factors no one talks about
  31. The Creators Of Pokémon Go Mapped The World. Now They're Mapping You
  32. WAV audio files are now being used to hide malicious code | ZDNet
  33. What is the Tor Browser? How it protects your identity online
  34. Teens find circumventing Apple’s parental controls is child’s play
  35. Deepfakes and their potential impact on society | SC Media
  36. A Controversial Plan to Encrypt More of the Internet
  37. Turn Bluetooth Off When You're Not Using It
  38. 11 top cloud security threats
  39. Permanent Record (autobiography) - Wikipedia
  40. How to Prevent Apple Employees From Listening to Your Siri Commands
  41. No One Knows About Two-Factor Authentication, and It's Putting Their Security at Risk
  42. Never Trust a Platform to Put Privacy Ahead of Profit
  43. 7 ways 5G mobile networks will change IoT security, and how to prepare
  44. Justice Department takes another run at encryption backdoors with ‘lawful access’
  45. Decryptors developed for new Muhstik and HildaCrypt ransomwares
  46. Tomorrow's attacks today: How to defend against next-generation cyberattacks | SC Media
  47. Kernel privilege escalation bug actively exploited in Android devices
  48. 5 OT security takeaways CISOs need to communicate to stakeholders
  49. The courts have ruled: Mobile sites must be accessible. But why did enterprises ever resist?
  50. VPNs won't solve these 3 problems for you
  51. How to Avoid Airbnb Scams
  52. FBI’s Use of Foreign-Surveillance Tool Violated Americans’ Privacy Rights, Court Found
  53. FBI warns about attacks that bypass multi-factor authentication (MFA) | ZDNet
  54. Russian hackers modify Chrome and Firefox to track secure web traffic
  55. Google launches leaked-password checker, will bake it into Chrome in December
  56. Rethinking Cyberisks amid a rapidly evolving threat environment | SC Media
  57. How Can I Find Out If Someone’s Stealing My Wifi?
  58. Technology and social change: How government CIOs can improve outcomes for citizens and society | ZDNet
  59. The four big US carriers want to help you get rid of passwords, but you’ll have to wait
  60. Google launches Password Checkup security tool | SC Media
  61. Linux to get kernel 'lockdown' feature | ZDNet
  62. Malware that can't be detected by Windows Defender is spreading by the thousands - MSPoweruser
  63. New SIM Card Attacks: Both Android And iOS Impacted—Are You Vulnerable?
  64. Amazon may soon be able to track your phone’s location even if you don’t use any of its products or services
  65. Apple Issues New Warning For Millions Of iPhone Users
  66. You Need a Password Manager. Here Are the Best Ones
  67. Unfixable Exploit Is the Latest Apple Security Upheaval
  68. Google Draws House Antitrust Scrutiny of Internet Protocol
  69. To use Alexa, you have to trust Amazon
  70. What a security career will look like in five years
  71. 'Right to be forgotten' by Google doesn't apply worldwide, Europe's top court rules
  72. The top 5 email encryption tools: More capable, better integrated
  73. 10 signs you're being socially engineered
  74. My Surprising Career as an Amazon.com "Fake" Reviewer | Anonymous
  75. Millions of medical records exposed online | SC Media
  76. In cybersecurity speed kills, but faster saves | SC Media
  77. Gamification: A winning strategy for cybersecurity training | SC Media
  78. Ransomware: 11 steps you should take to protect against disaster | ZDNet
  79. The ransomware crisis is going to get a lot worse | ZDNet
  80. The Air Force Will Let Hackers Try to Hijack an Orbiting Satellite
  81. 'Simjacker' Attack Can Track Phones Just by Sending a Text
  82. LastPass bug leaks credentials from previous site | ZDNet
  83. Sidewalk Labs' controversial data collection project is now a company
  84. Google collects face data now. Here's what it means and how to opt out
  85. Crypto-Gram: September 15, 2019 - Schneier on Security
  86. 2fa explained: How to enable it and how it works
  87. Wave goodbye to passwords: Soon you could unlock your PC just by holding up your hand | ZDNet
  88. US Govt. plant USB sticks in security study, 60% of subjects take the bait
  89. Google Finally Confirms Security Problem For 1.5 Billion Gmail And Calendar Users
  90. How to Delete Online Accounts You No Longer Need
  91. Wipe Data From Your Car Before Selling It
  92. The zero trust model explained | SC Media
  93. Facebook will no longer scan user faces by default
  94. Forget email: Scammers use CEO voice 'deepfakes' to con workers into wiring cash | ZDNet
  95. Cyberwar: The Complete Guide
  96. Face It -- Biometrics To Be Big In Cybersecurity
  97. The World's First Cyber Crime: The Morris Worm [KERNEL PANIC]
  98. The Myth of Consumer-Grade Security - Schneier on Security
  99. More than 400 police forces working with Ring to view doorbell cam footage
  100. Capital One hack shows difficulty of defending against irrational cybercriminals
  101. Microsoft: Using multi-factor authentication blocks 99.9% of account hacks | ZDNet
  102. Examining and addressing threat detection and response challenges
  103. The bogus-check scam is back, in the form of a car-wrap offer
  104. The most stressful aspects of being a cybersecurity professional
  105. 10 Best Password Manager Apps (2019 Updated) | Drippler - Apps, Games, News, Updates & Accessories
  106. The growing backlash against facial recognition tech
  107. Hackers Found a Freaky New Way to Kill Your Car
  108. Check your access control permissions before hackers do
  109. DNS hijacking campaign targets national security organizations
  110. Microsoft Office now the most targeted platform, as browser security improves
  111. Opinion | We Built an ‘Unbelievable’ (but Legal) Facial Recognition Machine
  112. Wipro clients hit after firm falls for phishing attack | SC Media
  113. Data on Thousands of Law Enforcement Personnel Exposed in Breach
  114. Is Using Public WiFi Still a Bad Idea?
  115. Tracking Phones, Google Is a Dragnet for the Police
  116. Future-proof cybersecurity: Addressing implementation challenges in quantum cryptography | SC Media
  117. Crypto-Gram: April 15, 2019 - Schneier on Security
  118. Use Your Android Phone as a Security Key for Signing into Websites
  119. Inside an Epic Hotel Room Hacking Spree
  120. Incognito mode won’t keep your browsing private. Do this instead
  121. Google Offers Built-In Security Key Feature for Android Phones
  122. Three lessons from the top cybersecurity threats of 2018 | SC Media
  123. How to Fight the Threat of USB Thumb Drives
  124. Call to delay use of Police Scotland data devices
  125. Facial recognition can speed you through airport security, but there's a cost
  126. How the EverCrypt Library Creates Hacker-Proof Cryptography | Quanta Magazine
  127. Facial recognition raises real ethical questions
  128. What Sony's robot dog teaches us about biometric data privacy
  129. Insurance Companies collaborate to offer Cybersecurity ratings | SC Media
  130. How to Protect Your Enterprise PCs Against Fake Updates
  131. Why 2019 will prove biometrics aren’t a security “silver bullet” | SC Media
  132. Crypto-Gram: March 15, 2019 - Schneier on Security
  133. Amex, Netflix customers targeted in phishing campaign | SC Media
  134. Here's how to view, download, and delete your personal information online
  135. Facebook Stored Millions of Passwords in Plaintext—Change Yours Now
  136. Facial recognition: Apple, Amazon, Google and the race for your face
  137. Locking More Than the Doors as Cars Become Computers on Wheels
  138. US Government Forging Ahead With Airport Facial Recognition Plans | Transportation | TechNewsWorld
  139. The Five Most Dangerous New Attack Techniques
  140. Will PSD2 Finally Kill The Password? | SC Media
  141. These are the 12 most common phishing email subject lines cyber criminals use to fool you | ZDNet
  142. 3 ways to monitor encrypted network traffic for malicious activity
  143. Phishing attacks: Half of organisations have fallen victim in last two years | ZDNet
  144. The NSA Makes Its Powerful Cybersecurity Tool Open Source
  145. Are employees the weakest (cybersecurity) link? Sometimes | SC Media
  146. Linux servers targeted by new Chinese crypto-mining group | ZDNet
  147. Fool ML once, shame on you. Fool ML twice, shame on... the AI dev? If you can hoodwink one model, you may be able to trick many more
  148. Microsoft wants to use blockchain to secure your identity
  149. Hackers Can Slip Invisible Malware into Some Cloud Computers
  150. NATO Group Catfished Soldiers to Prove a Point About Privacy
  151. Password manager flaws can expose data on compromised devices, report says | SC Media
  152. Using the zero trust model to prevent phishing | SC Media
  153. Explainer: What is quantum communication?
  154. The Wired Guide to Your Personal Data (and Who Is Using It)
  155. What is a man-in-the-middle attack? How MitM attacks work and how to prevent them
  156. What is phishing? How this cyber attack works and how to prevent it
  157. Scammer groups are exploiting Gmail 'dot accounts' for online fraud | ZDNet
  158. Major DNA testing company is sharing genetic data with the FBI
  159. Your digital identity has three layers, and you can only protect one of them
  160. Why Data Privacy Is About More Than Just Security
  161. Phishing attacks posing as missed voicemails nab credentials | SC Media
  162. What is a supply chain attack? Why you should be wary of third-party providers
  163. How WhatsApp Merger With Facebook Messenger Puts Your Privacy At Risk
  164. 12 Simple Things You Can Do to Be More Secure Online
  165. How Enterprises Need to Handle Today’s Threat Landscape
  166. Why Quantum-Resistant Encryption Needs Quantum Key Distribution for Real Security
  167. What is spear phishing? Why targeted email attacks are so difficult to stop
  168. Why Enterprises Need to Crack Down on Lazy Logins
  169. Why Marriott Breach Includes Some Valuable IT Lessons
  170. Data breaches can sucker-punch you. Prepare to fight back
  171. Marriott breach exposes more than just customer info | SC Media
  172. Hackers target Dell customer information
  173. Lawmakers call for data security legislation in wake of Marriott breach
  174. Cybercrime and cyberwar: A spotter's guide to the groups that are out to get you | ZDNet
  175. Cyberwar predictions for 2019: The stakes have been raised | ZDNet
  176. Survey shows IT professionals concerned about cyberwarfare, end users, and conducting international business | ZDNet
  177. Little FYI: Wi-Fi calling services on AT&T, T-Mobile US, Verizon are insecure, say boffins
  178. Mobile Phone Security: All You Need to Know | Cybersecurity | TechNewsWorld
  179. Be Warned: Customer Service Agents Can See What You're Typing in Real Time
  180. New cryptominer seeks out root permissions on Linux machines | SC Media
  181. The FBI Created a Fake FedEx Website to Unmask a Cybercriminal
  182. USPS fixes 'Informed Delivery' flaw that exposed 60M users | SC Media
  183. Career advice: Good enough security trumps best security
  184. Surveillance Kills Freedom By Killing Experimentation
  185. IRS Issues Urgent Warning On Tax Transcript Scam
  186. What network pros need to know about IoT
  187. Utilizing the Human Element to Mitigate Today’s Sophisticated Cyber Threat Landscape
  188. Crypto-Gram: November 15, 2018 - Schneier on Security
  189. With $20 of Gear from Amazon, Nearly Anyone Can Make This IMSI-Catcher in 30 Minutes
  190. Apache Struts vulnerability would allow system take over | SC Media
  191. Worst malware and threat actors of 2018 so far
  192. National biometric database could be on the way (and in private hands) | ZDNet
  193. Hackers are increasingly destroying logs to hide attacks | ZDNet
  194. Mobile device security: A guide for business leaders - Tech Pro Research
  195. How to keep your data secure and private, step by step
  196. ​The day computer security turned real: The Morris Worm turns 30 | ZDNet
  197. Cyber threats fueled by AI: Security's next big challenge
  198. DDoS and ransomware tools for starter and experienced cybercriminals exposed | SC Media
  199. Thieves steal a Tesla Model S by hacking the entry fob
  200. Free decryption tool released for multiple GandCrab ransomware versions | ZDNet
  201. Most consumers have cyber security concerns, but a fraction take action | ZDNet
  202. Create an Alias For Your iCloud Address to Maintain Your Online Privacy
  203. Tim Cooks warns of ‘data-industrial complex’ in call for comprehensive US privacy laws
  204. Latest Firefox takes aim at tracking cookies and promotes the use of VPN
  205. Every minute for three months, GM secretly gathered data on 90,000 drivers' radio-listening habits and locations
  206. U.S. Begins First Cyberoperation Against Russia Aimed at Protecting Elections
  207. Six tips to stop phishing attacks | SC Media
  208. Securing Middle America: small towns more at risk of ransomware, phishing and more | SC Media
  209. 3 top multi-cloud security challenges, and how to build a strategy
  210. Facebook reportedly aims to buy a 'major' cybersecurity company
  211. 5 reasons eSignatures are the must-have tool you don't think about
  212. How to Stay Anonymous Online | Digital Trends
  213. 17 penetration testing tools the pros use
  214. Securing risky network ports
  215. Why CISOs Fumble With Understanding Security Needs
  216. Why Supply Chain Security a Serious Enterprise Problem
  217. Expanding attack surfaces and difficulties obtaining the right people worry NCSA panelists | SC Media
  218. Despite proposed solutions, DNS security issues remain in tech industry
  219. Crypto-Gram: October 15, 2018 - Schneier on Security
  220. 'Flash update' scam serves up legit software, but with a side of cryptominer | SC Media | SC Media
  221. Ransomware hits Madison County Idaho government | SC Media | SC Media
  222. It Only Took 9 Seconds to Guess a DOD Weapons System Password
  223. What is IAM? Identity and access management explained
  224. Apple, Amazon deny servers affected by China microchip plot | SC Media
  225. Five Trends in Attacks on Industrial Control Systems
  226. Apple, Amazon deny report that Chinese spy chips infiltrated their hardware
  227. China Used a Tiny Chip in a Hack That Infiltrated Amazon and Apple
  228. Digital IDs Are More Dangerous Than You Think
  229. Security News This Week: The Feds Can't Force Facebook to Wiretap Messenger
  230. Quantum computers could break encryption, so it’s going quantum too
  231. Everything We Know About Facebook's Massive Security Breach
  232. 5 biggest cybersecurity challenges at smaller organizations
  233. Trump's Immigration Cops Just Gave America's Hottest iPhone Hackers Their Biggest Payday Yet
  234. Four Security Questions Healthcare Organizations Must Address When Moving to the Cloud | SC Media
  235. Mobile Carriers Join Together for Project Verify Authentication Effort
  236. Five security settings in iOS 12 you should change right now
  237. What is Zero Trust? A model for more effective security
  238. Crypto-Gram: September 15, 2018 - Schneier on Security
  239. You'll never guess what you can do once you steal a laptop, reflash the BIOS, and reboot it
  240. A Decade-Old Attack Can Break the Encryption of Most PCs
  241. For safety’s sake, we must slow innovation in internet-connected things
  242. 6 ways companies fail at security fundamentals
  243. How to Send a Secret Image in Plain Sight
  244. Facebook launches Clear History feature that should have been there all along | ZDNet
  245. Mark Zuckerberg Says It Will Take 3 Years to Fix Facebook
  246. Everything Facebook Announced Today at F8
  247. Cyber security: Don't leave it to your tech team or you'll get breached, warns data protection chief | ZDNet
  248. Private web browsing doesn’t mean no one is watching
  249. Worse Than Y2K: Quantum Computing And The End Of Privacy
  250. Nine Best Practices for Keeping Bad Actors Out of a Database
  251. Crypto-Gram: April 15, 2018 - Schneier on Security
  252. The One Router Setting Everyone Should Change (But No One Does)
  253. How quantum computing could wreak havoc on cryptocurrency
  254. DNS Security with DNSCrypt | OpenDNS
  255. Amazon Advances Cloud Security, Storage Tools at AWS Summit
  256. How to Create Secure Passwords That Aren't Impossible to Type
  257. How to use Cloudflare's DNS service to speed up and secure your internet | ZDNet
  258. 10 Ways to tell if that email is legitimate...or not
  259. Are you ready? This is all the data Facebook and Google have on you | Dylan Curran
  260. StumbleUpon
  261. GitHub Survived the Biggest DDoS Attack Ever Recorded
  262. FBI's Use of Paid Best Buy Informants Goes Deeper Than We Knew
  263. IT pros don't learn from cyberattacks, study
  264. Apple App Store Scam Stealing Credit Cards: What to Do
  265. FTC warning users to do homework before using VPN apps
  266. DoubleDoor Botnet Chains Exploits to Bypass Firewalls
  267. Study shows which phishing attacks most successful
  268. Microsoft is trying to kill passwords. It can't happen soon enough
  269. Add a PIN to Your Smartphone Account
  270. Why Linux is better than Windows or macOS for security
  271. Improving Cyber-Security Hygiene: Nine Methods to Fight Off Intruders
  272. Many businesses still using outdated security, says Troy Hunt
  273. Your Sloppy Bitcoin Drug Deals Will Haunt You for Years
  274. What Is Bitcoin, and How Does it Work?
  275. How does Bitcoin work? - Bitcoin
  276. New to Bitcoin?
  277. Best Password Managers 2018
  278. The Best VPN Services and Apps of 2018
  279. To Improve Cybersecurity, Start with Improving Human Behavior
  280. Watch a 10-Year-Old's Face Unlock His Mom's iPhone X
  281. Cybersecurity is dead – long live cyber awareness
  282. Google: Our hunt for hackers reveals phishing is far deadlier than data breaches | ZDNet
  283. Update Your Tor Browser to Prevent It From Leaking Your Real IP Address
  284. Know the risks of Amazon Alexa and Google Home
  285. 7 steps for crafting the perfect password
  286. T-Mobile Alerted ‘A Few Hundred Customers’ Targeted By Hackers
  287. Phishing Attacks: Which Departments Are Most at Risk?
  288. KRACK Attack Hacks All Wi-Fi Networks: What to Do
  289. How to Secure Your (Easily Hackable) Smart Home
  290. Security experts air concerns over hackers using AI and machine learning for phishing attacks
  291. Intelligence Experts Say Cyber-Thieves, Nation-State Hackers Teaming Up
  292. Cleartext passwords, and worse found among top 21 financial trading apps
  293. Equifax's disastrous Struts patching blunder: THOUSANDS of other orgs did it too
  294. Quantum Computing Poses Risks to Cryptography and Bitcoin

  295. DDoS protection, mitigation and defense: 7 essential tips
  296. Must-have Wi-Fi troubleshooting and management tools
  297. BlueBorne Bluetooth Flaws Put Billions of Devices at Risk
  298. Discovery Channel - The Secret History Of Hacking
  299. What’s the Difference Between a Fraud Alert, Security Freeze and Credit Lock?
  300. New Social Security Scam Targets Benefit Check Recipients
  301. Equifax breach: How to protect yourself
  302. Top secret data on former U.S. military personnel exposed on Amazon S3 repository
  303. Data breach exposes about 4 million Time Warner customer records
  304. Google Removes Malicious WireX DDoS Botnet Apps from Play Store
  305. Hacking Retail Gift Cards Remains Scarily Easy
  306. If Your Email Address Is On This List, Change Your Password Right Now
  307. TunnelBear: Secure VPN Service
  308. WannaCry Helps Push Cyber-Crime Attacks to New Heights in 2Q17
  309. Fuzzing Analysis Shows ICS, IoT Industries Most at Risk of Zero Days
  310. The Very Best Hacks From Black Hat and Defcon
  311. An Obscure App Flaw Creates Backdoors In Millions of Smartphones
  312. The Best VPN Services
  313. Galaxy S8 face recognition already defeated with a simple picture
  314. Private Internet Access, a VPN provider, takes out a full page ad in The New York Time calling out 50 senators.
  315. Here's how to wipe your old iPad/iPhone/iPod touch ready for resale | ZDNet
  316. A hacker explains why Trump using his old Android phone for Twitter could be a huge security threat
  317. For True Cyber Security, Using a USB Firewall Is Essential
  318. Say Hello to the Super-Stealthy Malware That’s Going Mainstream
  319. Abbrase - Abbreviated Passphrase Password Generator - Darknet
  320. Here's how protect your privacy from hackers and spies
  321. Sophisticated Phishing: Beware the Latest Gmail Phishing Attack | NewsFactor Network
  322. Hardening the Linux server
  323. 20 Linux Server Hardening Security Tips
  324. How to See Everything Your Browser Knows About You
  325. Online Security Made Easy
  326. This $5 Device Can Hack Your Locked Computer In One Minute
  327. Chinese company installed secret backdoor on hundreds of thousands of phones
  328. Beware, iPhone Users: Fake Retail Apps Are Surging Before Holidays
  329. Online Threats Still Rising as Mobile Malware Subsides: Kaspersky
  330. This evil office printer hijacks your cellphone connection
  331. After You Strengthen Your Passwords, Here’s How to Store Them
  332. Trending Mobile VPN Technologies That You Know Of - Information Security Buzz
  333. Information security set for steep trajectory, says (ISC)2
  334. Ethical Hacking Tutorials, Tips and Tricks
  335. Hacksplaining: Learn to Hack
  336. Internet Providers Could Be the Key to Securing All the IoT Devices Already out There
  337. Google's AI created its own form of encryption
  338. Forget the Touch Bar. The MacBook Pro’s Most Important New Feature Is Touch ID
  339. Better safe than sorry: 5 apps for encrypting and shredding files
  340. Attackers Hiding Stolen Credit Card Numbers in Images
  341. Federal Regulators Want Banks to Follow Better Cybersecurity Practices
  342. Crash: how computers are setting us up for disaster | Tim Harford
  343. No endgame for cyber security, says Mikko Hypponen
  344. 10 Tips for Identifying and Dealing With Phishing Email
  345. Tech Support Scams Evolve to Target Broader Range of Users
  346. Microsoft: Tech Support Scams Hit Two-Thirds of Consumers
  347. Hacking demo(messing with loud neighbors) - YouTube
  348. Feds Walk Into A Building. Demand Everyone's Fingerprints To Open Phones
  349. How a chunk of the web disappeared this week: GlobalSign's global HTTPS snafu explained
  350. Remove ransomware infections from your PC using these free tools | ZDNet
  351. Artificial intelligence-powered malware is coming, and it's going to be terrifying
  352. Rethinking Data Protection, Recovery in a Multi-Cloud World
  353. This Hacked Kids’ Toy Opens Garage Doors in Seconds
  354. Lack of IoT Security Is Huge Risk for Critical Enterprise IT Systems
  355. If you've ever created a Yahoo account, take these steps immediately to protect your data
  356. Yahoo under fire over data breach affecting 500 million users
  357. Security News: Cyber, IT, National Security | WIRED
  358. Cloud computing: Four reasons why companies are choosing public over private or hybrid clouds | ZDNet
  359. Dropbox Breach Exposes 68 Million Passwords
  360. Create a Strong Password Using These Tips and Tools
  361. LastPass Authenticator Two-Factor App Launch
  362. FedEx: Amazon would have to spend 'tens of billions' to compete with us
  363. 10 Great Security Tools You Should Be Using
  364. A Journey in the Life of an Encrypted Email
  365. 9 Facts About Computer Security That Experts Wish You Knew
  366. P0wned plug-in puts a million WordPress sites at risk of attack
  367. Why Security Awareness Alone Won't Stop Hackers
  368. The Top 8 Mobile Security Risks: How to Protect Your Organization
  369. 10 Security Apps to Help Your Android Device Fend Off Malware
  370. Schneier on Security: My Conversation with Edward Snowden
  371. Schneier on Security: January 15, 2015
  372. The Five Best Password Managers
  373. LastPass releases Open Source command line client • The Register
  374. Planning Considerations for BYOD and Consumerization of IT (Part 6)
  375. How To Use John The Ripper To Crack Passwords-BackTrack Tutorials For Beginners - Learn With Pranshu
  376. How to Tap Your Network and See Everything That Happens On It
  377. How to Hack Your Own Network and Beef Up Its Security with Kali Linux
  378. Google goes beyond two-step verification with new USB Security Key | Naked Security
  379. YubiKey Authentication | LastPass User Manual
  380. Frequently Asked Questions
  381. POODLE attack takes bytes out of your encrypted data – here’s what to do | Naked Security
  382. With This Tiny Box, You Can Anonymize Everything You Do Online | WIRED
  383. The Ultimate Wireshark Tutorial
  384. Apple Pay security: Hope abounds, but questions linger
  385. http://people.redhat.com/duffy/selinux/selinux-coloring-book_A4-Stapled.pdf
  386. The Start-to-Finish Guide to Securing Your Cloud Storage
  387. Google’s Location History is Still Recording Your Every Move
  388. Nearly Half Of Americans Claim They've Changed Their Behavior Due To NSA | Techdirt
  389. The Beginner’s Guide to iptables, the Linux Firewall
  390. Here's Everywhere You Should Enable Two-Factor Authentication Right Now
  391. Introduction to Wireshark (Part 1 of 3)
  392. Following Best Coding Practices Doesn't Always Mean Better Security - Slashdot
  393. Aging networking protocols abused in DDoS attacks - security, Prolexic - Computerworld
  394. The 7 elements of a successful security awareness program - Network World
  395. SANS NewsBites
  396. Supply chain 2013: Stop playing whack-a-mole with security threats - Network World
  397. Schneier on Security: Pinging the Entire Internet
  398. Book Review: The Death of the Internet - Slashdot
  399. Review: OpenPuff steganography tool hides confidential data in plain sight | PCWorld
  400. 15 (FREE!) security tools you should try
  401. We suck at security, study says [infographic] | VentureBeat
  402. Hacker 10 – Security Hacker | Computer security tutorials, encryption and privacy software.
  403. Metasploit Helpful Tips | SOA World Magazine
  404. Dropbox Rolls Out Two-Step Verification; Use It
  405. Android Passwords are stored in plain text on Disk ~ THN : The Hacker News
  406. The 5 Biggest IT Security Mistakes | PCWorld
  407. Cellular network hijacking for fun and profit • The Register
  408. Forget Anonymous: Evidence Suggests GOP Hacked, Stole 2004 Election : politics
  409. Use Lion's FileVault 2 to encrypt your Mac's internal drive | Storage | Macworld
  410. Why you shouldn't trust Google (or any cloud service) with your data | ZDNet
  411. Default Router Passwords - The internets most comprehensive router password database
  412. Beware the All-Powerful Administrator - PCWorld
  413. Security Secrets the Bad Guys Don't Want You to Know
  414. Timeline: The History of Hacking


  1. My Search For The Perfect Linux OS Just Ended — With An Unexpected Surprise
  2. iOS 13.2 tips: Check these security and privacy settings today | ZDNet
  3. MacOS 10.15 Catalina Review: More Mobile Features, More Security, and No More iTunes
  4. One of Linux's most important commands had a glaring security flaw
  5. Understanding and administering systemd :: Fedora Docs Site
  6. Decoding Apple’s Touch Bar philosophy
  7. Apple Confirms Serious MacBook Pro Problems In MacOS Catalina
  8. How to find out if your apps are compatible with macOS Catalina
  9. All the Best iPadOS Features That You Don't Get in iOS
  10. Here’s What Sets iPadOS Apart from iOS - TidBITS
  11. iOS, iPadOS and tvOS 13.1 updates are now available – TechCrunch
  12. An introduction to the Linux boot and startup processes
  13. Apple iOS 13 Has 25 Great Secret Features
  14. How to take full advantage of Android 10's privacy-reclaiming powers
  15. 21 Best Kali Linux Tools for Hacking and Penetration Testing
  16. Take These Steps Before Installing Android 10 on Your Phone
  17. Linux on your laptop: Here's what you need to know about UEFI firmware | ZDNet
  18. The best Android file manager apps
  19. Microsoft wants to bring exFAT to the Linux kernel – TechCrunch
  20. Working with variables on Linux
  21. The best Android keyboard apps for on-the-go productivity
  22. Two thirds of Android antivirus apps don't work properly
  23. Know When Malware Tries to Access Your Mac's Camera or Mic With This App
  24. What is Linux? Everything you need to know about the open-source operating system
  25. How to identify shell builtins, aliases and exe files on Linux systems
  26. Command-Line Tip: Put Down the Pipe | Linux Journal
  27. Testing openSUSE, Manjaro, Debian, Fedora, and Mint Linux distributions on my new laptop | ZDNet
  28. How to Speed up Your Mac | Digital Trends
  29. Android security: Analysis, advice, and next-level knowledge
  30. systemd unit file basics - Fedora Magazine
  31. 13 Best File Managers for Linux Systems
  32. systemd-analyze plot - Google Search
  33. Microsoft Pledges to Protect Linux and Open Source With Its Patents
  34. Understanding Bash: Elements of Programming | Linux Journal
  35. 10.6. Creating and Modifying systemd Unit Files Red Hat Enterprise Linux 7 | Red Hat Customer Portal
  36. systemd file locations fedora - Google Search
  37. With Linux’s founder stepping back, will the community change its culture?
  38. bash howto - Google Search
  39. The Best New Features to Try in iOS 12
  40. 10 best email apps for Android
  41. Microsoft’s bid to secure the Internet of Things: Custom Linux, custom chips, Azure
  42. The best Android file manager apps
  43. Fedora 28 Set to Deliver New GNOME Linux Desktop for Workstations
  44. Why not the best? Why not Linux Mint?
  45. 21 keyboard shortcuts Mac users need to know
  46. 10 Ways KDE Is a Better Linux Desktop Than GNOME
  47. How to Install Software on Linux
  48. 7 Useful macOS Tricks You Might Not Know
  49. How to mount an ISO image/file under Linux - nixCraft
  50. Five hidden features of Android 8.0 Oreo you should be using
  51. Home - FUSE for macOS
  52. Mingis on Tech: All about Android 8.0 'Oreo'
  53. 24 Things You Can Do in iOS 11 That You Couldn't Before
  54. iOS 10 Tips and Tricks for iPad - Apple Support
  55. iOS 11 improvements that Apple wants to tell you about
  56. Apple shows you how to use iOS 11 on iPad Pro
  57. Linux Operating Systems for The Paranoid: What Are The Most Secure Options?
  58. How to run multiple commands in sudo under Linux or Unix
  59. OpenSnitch: The Little Snitch application like firewall tool for Linux
  60. The 10 Best Launchers for Android | Drippler - Apps, Games, News, Updates & Accessories
  61. The Best Email Client for MacOS
  62. How to Use Your Bash History in the Linux or macOS Terminal
  63. Apple Clips (for iPhone)
  64. Mac Users Should Ditch Google Chrome for Safari
  65. Bixby Brings Samsung Smartphones Into the Personal Assistant Era
  66. Linux Commands - Overview and Examples
  67. Parrot Security OS 3.5 Improves Linux Security Tools Distribution
  68. All the Folders You Can Probably Exclude From Your Mac's Backups
  69. What’s the Difference Between Bash, Zsh, and Other Linux Shells?
  70. How to create Kali Linux bootable USB live in windows 10
  71. WiFi Pineapple NANO: Kali Linux 2.0 Internet Connection Sharing
  72. Which Linux File System Should You Use?
  73. How to find all hard links in a directory on Linux
  74. How to setup a Linux server on Amazon AWS,
  75. 5 Interesting New Photo Viewing and Editing Apps to Download
  76. The Most Used Linux Terminal Commands and What They Do
  77. Five Tools for Beginners that Power Up the Command Line
  78. Linux command line navigation tips/tricks 3 - the CDPATH environment variable
  79. How to Copy Multiple Things to Your Mac’s Clipboard at Once
  80. Advanced Bash-Scripting Guide
  81. My First 10 Minutes On a Server - Primer for Securing Ubuntu
  82. How to split a large archive file into multiple small files using Split command in Linux
  83. GNU GRUB Manual 2.00
  84. Android 7.1's Keyboard Is Hiding a Handy New GIF Search Tool
  85. Pixel Phones Bought From Google Will Have Unlockable Bootloaders
  86. 7 Reasons Why You Should (and Shouldn’t) Dual Boot Linux
  87. Systemd - FedoraProject
  88. SysVinit explained: starting and stopping of services | linuxvoodoo.com
  89. Boot process, Init and shutdown
  90. Meet systemd, the controversial project taking over a Linux distro near you
  91. systemd - Wikipedia, the free encyclopedia
  92. The Story Behind 'init' and 'systemd': Why 'init' Needed to be Replaced with 'systemd' in Linux
  93. linux startup systemd vs systemv - Google Search
  94. 10 Most Valuable Features in Apple's macOS Sierra
  95. Apple to fix backup security vulnerability in iOS 10
  96. Top 10 iOS 10 Features for iPad
  97. 12 hidden features in iOS 10
  98. Top 10 Terminal Tricks in macOS
  99. Kali Linux 2016.2 Delivers New Security Testing Options
  100. linux distro comparison - Google Search
  101. Bash Guide for Beginners, Free Machtelt Garrels Guide
  102. 5 of the Best Antivirus Programs for Ubuntu - Make Tech Easier
  103. Linux Took Over the Web. Now, It’s Taking Over the World
  104. LinuxCon: Tracing Linux's Roots, Mapping Its Future
  105. Linux at 25: What's Behind Its Success and Where It's Going
  106. How To Create ISO Files In Linux
  107. How Net Neutrality Works, And How It Affects You
  108. What You Must Know About Linux Rootkits
  109. How to Install Encfs and Encrypt Files in Mac OS X - Make Tech Easier
  110. Three Ways to Password Protect Folder on Mac OS X(El Capitan Included)
  111. How to Lock A Folder on Mac for Free without Software(El Capitan Included)
  112. Run Android Apps on Linux with Shashlik
  113. Cyborg Hawk Linux - Penetration Testing Linux Distro - Darknet - The Darkside
  114. Parallels, VMware, VirtualBox & Boot Camp face off
  115. Fedora 23 Improves Security, Desktop and Cloud
  116. 11 Hidden OS X El Capitan Features You Might Not Know About
  117. How to Use OS X’s New Split Windows View
  118. How to Enable Android 6.0’s Experimental Multi-Window Mode
  119. How to Easily Select Your Default Apps in Android 6.0
  120. How to Use Android 6.0’s Built-in File Manager
  121. How to speed up your internet connection on Linux
  122. 14 Things You Can Do in Android Marshmallow That You Couldn't Do in Lollipop
  123. How to Install and Configure CSF (Config Server Firewall) on CentOS 7
  124. How to Change a USER and GROUP ID on Linux For All Owned Files
  125. The Beginner’s Guide to Shell Scripting: The Basics
  126. systemd
  127. How To SSH Run Multiple Command On Remote Machine And Exit Safely
  128. Howtoforge Linux Tutorials.
  129. BackBox Linux - Penetration Testing LiveCD - Darknet - The Darkside
  130. Top 3 Online Resources For Learning The Command Line
  131. Debugging Bash scripts
  132. Bash Shell PS1: 10 Examples to Make Your Linux Prompt like Angelina Jolie
  133. Intel's New Processors Bring 'Most Significant Advancements in Computing'
  134. Linus Torvalds Talks Linux Security at LinuxCon
  135. 5 YouTube Videos to Help You Get Started with Linux
  136. 4 of the Best Markdown Editors for Linux
  137. 5 Cool Android Camera Tricks with Camera360 Ultimate
  138. VirtualBox error "VT-x is disabled in the BIOS. (VERR_VMX_MSR_VMXON_DISABLED)"
  139. 22.9. Enabling Intel VT-x and AMD-V virtualization hardware extensions in BIOS
  140. virtualbox.org • View topic - Error after upgrade:VT-x is not available. (VERR_VMX_NO_VMX)
  141. Pentoo - Gentoo Based Penetration Testing Linux LiveCD - Darknet - The Darkside
  142. Rosetta Stone for Unix
  143. Linux Vs Unix: The Crucial Differences That Matter To Linux Professionals
  144. What Really Happens When You Delete Something from Your PC
  145. Android Lollipop: Taking mobile security to a new level
  146. Linux File Systems: Ext2 vs Ext3 vs Ext4
  147. General overview of the Linux file system
  148. Comparison of Linux distributions - Wikipedia, the free encyclopedia
  149. Linux Journal | The Original Magazine of the Linux Community
  150. How To Easily Enable Silverlight, And Watch Netflix, on Linux
  151. netfilter/iptables project homepage - The netfilter.org project
  152. I have a SysV init script on Fedora 18. How can I make it start after the network is ready? - Stack Overflow
  153. KDE System Administration/Startup - KDE TechBase
  154. Glx-Dock / Cairo-Dock - Home
  155. LibreOffice Review & Rating | PCMag.com
  156. Using Linux in a Windows world
  157. The Best Navigation App for iOS
  158. Demystifying Android 4.2 Jelly Bean | ExtremeTech
  159. Buzzblog: EXCLUSIVE: Watch Steve Jobs play FDR in Apple's long-lost takeoff on famous '1984' Macintosh TV commercial
  160. Bartender Cleans Up Your Mac’s Menubar
  161. Opening the OS X Firewall for your Server
  162. Top 10 Downloads That Enhance Mac OS X's Built-In Tools | Digg Technology
  163. NTFS-3G for Mac OS X: NTFS-3G 2009.4.4
  164. Mounting remote filesystems on OSX Leopard using sshfs, MacFuse and Macfusion
  165. Mac Os X: Mount NFS Share / Set an NFS Client
  166. 10.6: Mount remote Linux sshfs disks in 64-bit 10.6 - Mac OS X Hints
  167. The MacPorts Project -- Home
  168. The Best News Reader Application for Linux
  169. Eight tips for OS X's Quick Look | Macworld
  170. The Best Virtual Assistant for Android
  171. SlingPlayer (Kindle Fire Edition) Review & Rating | PCMag.com
  172. 15 Apps and Tweaks That May Convince You to Jailbreak Your iPhone
  173. OSXFUSE for Mac
  174. The best tidbits from the Steve Jobs bio - CNN.com
  175. Linux Desktop Faceoff: GNOME 3 Shell vs Ubuntu Unity
  176. 15 Free Apps for Personalizing Your Android Phone
  177. Systemd - FedoraProject
  178. 18 ways to view the ~/Library folder in Lion | Operating Systems | Macworld
  179. MacBook Air and OS X Lion synergy: A big hurdle for Windows 8 | ZDNet
  180. Virtualboxes.org Helps You Discover Your New Favorite Linux Flavor with Tons of Virtualbox Images
  181. Top 10 Secret Features in Mac OS X Lion
  182. Linux 3.0 a Steady Step Forward | PCWorld
  183. Oracle VM VirtualBox
  184. Get the Linux Mint GNOME Menu in Ubuntu [Linux Tip]

Cool! / Interesting

  1. Amazon Echo Studio review: finally, an Echo that sounds great
  2. The Internet Archive Is Making Wikipedia More Reliable
  3. As the internet turns 50, experts weigh future advances and emerging issues
  4. What's in the latest Firefox update? Firefox 70 stops social media trackers
  5. The latest version of Firefox shows the wild scale of web tracking
  6. Remember The Dress? Here’s Why We All See Colors Differently
  7. 7 ways to use augmented reality on your phone
  8. Master data analytics and deep learning with this $35 Python certification bundle
  9. USB-C Has Finally Come Into Its Own
  10. Samsung Galaxy Watch Active 2 review: ‘good’ is as good as it gets
  11. The best open source software of 2019
  12. Prepare for the Deepfake Era of Web Video
  13. What's Your Favorite News Aggregator or RSS Reader?
  14. What is JavaScript? JavaScript and ECMAScript, explained
  15. Everything Amazon Announced Today, From Speakers to Glasses
  16. The Best Fitness Trackers and Watches for Everyone
  17. Why Your Memory Sucks, and What You Can Do About It
  18. 10 weirdest things your Amazon Echo can do
  19. Edward Snowden in His Own Words: Why I Became a Whistle-Blower
  20. Why France and Germany fear Facebook’s cryptocurrency – and plan to block it
  21. Top 10 file-sharing options: Dropbox, Box, Google Drive, OneDrive and more
  22. Three words for a faster emergency response | what3words
  23. The Best Smart Displays for 2019
  24. What Sci-Fi Can Teach Computer Science About Ethics
  25. Kernel Panic: Inside the World's Worst Cyberattacks
  26. Mathematicians Discover the Perfect Way to Multiply
  27. MicroLED is the first new screen tech in a decade. Can it beat OLED?
  28. Disney Plus will cost $7 a month and launch Nov. 12
  29. What Is 5G?
  30. 3 Reasons Brits Voted For Brexit
  31. Apple News+ has issues, but it's a great deal for casual readers
  32. The danger of “I already pay for Apple News+”
  33. Your Environment Is Cleaner. Your Immune System Has Never Been So Unprepared.
  34. The Most Beautiful Day Hikes In America
  35. Pilot Who Hitched a Ride Saved Lion Air 737 Day Before Deadly Crash
  36. AI Algorithms Are Now Shockingly Good at Doing Science
  37. Foldable phones are about to make the US very jealous
  38. Inside the High-Stakes Race to Make Quantum Computers Work
  39. The 20 Best Places to Go in 2019
  40. Confused By Expiration Dates? You’re Not Alone. Here’s What They Really Mean
  41. Apple's Radical New iPhone Suddenly Takes Shape
  42. The best e-reader you should buy
  43. 10 Breakthrough Technologies 2019, curated by Bill Gates
  44. Today's Companies Have A Technology Adoption Problem, Not An Innovation Problem
  45. Facebook’s promised Clear History privacy tool to launch later this year following delay
  46. Wi-Fi 6, explained: how fast it really is
  47. Do Not Disturb: How I Ditched My Phone and Unbroke My Brain
  48. 15 Moments That Defined Facebook's First 15 Years
  49. 15 Years of Facebook in 4 Charts
  50. What programming languages rule the Internet of Things?
  51. How a Vermont social network became a model for online communities
  52. Super Blood Wolf Moon in Pictures
  53. Tim Cook calls on FTC to let consumers track and delete their personal data
  54. How Ring's Neighbors app is making home security a social thing
  55. 190 universities just launched 600 free online courses. Here’s the full list.
  56. Explainable AI: Peering inside the deep learning black box
  57. 100 Websites That Shaped the Internet as We Know It
  58. Web Founder Launches Inrupt to Improve Internet Privacy
  59. The Birth of Google
  60. Amazon Wants Alexa to Hear Your Whispers and Frustration
  61. Reimagining of Schrödinger's Cat Breaks Quantum Mechanics--and Stumps Physicists
  62. 10 critical points from Zuckerberg’s epic security manifesto
  63. The WIRED Guide to Virtual Reality
  64. Microsoft Translator Uses AI to Break Language Barriers on Smartphones
  65. Here Are the Major New Features Google Added to Gmail Today (and What It Didn't)
  66. Google’s astounding new search tool will answer any question by reading thousands of books
  67. RSS is undead
  68. It's Time For an RSS Revival
  69. SpareFoot Acquires SiteLink to Drive Innovation for the Self-Storage Industry - The SpareFoot Blog
  70. How the iPad Pro with Smart Keyboard totally replaced my Macbook | ZDNet
  71. Augmented Reality Check: Why Businesses are Embracing AR in 2018
  72. Microsoft’s new open source tool lets you bring your own Linux distro to Windows
  73. How IBM Aims to Make AI Commonplace in AppDev, Business
  74. Why Blockchain Will Survive, Even If Bitcoin Doesn’t
  75. The Secret to a High Tech Concierge Medical Office? Data
  76. Why Artificial Intelligence Researchers Should Be More Paranoid
  77. Introducing AMP Stories, a Whole New Way to Read WIRED
  78. The hottest iPhone and Android accessory we’ve covered in 2018 so far is only $37 on Amazon
  79. Muse Auto smartens your car with Alexa
  80. What Is Bitcoin? | Cool History
  81. The Entire History of Bitcoin in a Single Infographic
  82. Should Data Scientists Adhere to a Hippocratic Oath?
  83. The Chrome Extensions We Can't Live Without
  84. Intel wants smart glasses to be a thing
  85. You can now use Alexa to send SMS messages
  86. Best Amazon Alexa Skills 2018 - Top 50 Cool and Useful Things Alexa Can Do
  87. You Need to Deal With Your Digital Legacy Right Now
  88. Facebook Local Might Be the Only Facebook App You Need
  89. StumbleUpon
  90. Twenty Years after His Death, Carl Sagan Is Still Right
  91. A history of hacking and hackers
  92. Here's what happened when 30 high school sophomores gave up their phones for a day
  93. Find Out Which Cognitive Biases Alter Your Perspective
  94. Life-hacking websites you didn’t know existed (10 photos)
  95. The 10 must-have Safari extensions of 2017
  96. The 12 must-have Firefox add-ons of 2017
  97. Google Earth Gets a Huge Redesign with Guided Tours, 3D View, and More
  98. USAFacts
  99. Is Evernote Premium Worth Its Money for You?
  100. Evernote Embraces MacBook Pro's Touch Bar for Faster Note Taking
  101. 15 fascinating facts you probably didn't know about Amazon
  102. The 15 Most Useful Google Apps You Never Knew Existed
  103. The Seven Best Things You Can Do With an Amazon Echo
  104. This Site Shows You Both Sides of Major Controversial Issues
  105. 5 Brilliant Kindle Apps and Sites Every Ebook Lover Needs
  106. The world's smallest USB-C laptop charger—I'm in love
  107. Google Maps lets you save and share favorite places with launch of Lists
  108. Physicists Just Showed That Quantum Entanglement Is a Physical Reality
  109. Top 10 Free Alternatives to Expensive Software
  110. Apple CarPlay: everything you need to know about iOS in the car
  111. Comparing Microsoft's New Surface Book to Apple's MacBook Pro
  112. A Free Open Source Alternative to Microsoft Visio
  113. Massive banks are ripping off Americans. There is finally an alternative.
  114. REVIEW: Google Home is a win (and better than the Amazon Echo)
  115. These Skills Are Hard To Learn But Pay Off For The Rest of Your Life – The Mission
  116. Millennials changing the face of cybersecurity
  117. 10 Powerful Habits That Will Boost Your Intelligence
  118. The real-world uses for virtual reality - BBC News
  119. This Week's Top Downloads
  120. Amazon Launches New Prime Reading Program
  121. QuickSafes.com
  122. The AI disruption wave
  123. How people are using the Amazon Echo: New study reveals surprising patterns
  124. United States set to Hand Over Control of the Internet to ICANN Today
  125. US hands over control of internet on schedule - despite last-ditch protests | ZDNet
  126. Google Allo: Everything you need to know | Drippler - Apps, Games, News, Updates & Accessories
  127. A Gorgeous—and Unsettling—Video of Evolution in Action
  128. Top 10 Places to Download or Stream Movies For Free, Legally
  129. 11 basic Excel tricks that will change your life
  130. The Ultimate Road Trip Has Been Planned By Scientists. THIS Is What It Looks Like
  131. 6 literary classics you should listen to as audiobooks
  132. Three essential coding languages you can learn today
  133. IBM's Watson analyzed all the 'Harry Potter' books and movies — and the results are fascinating
  134. 35 Most Popular Facebook Pages in the Geek World
  135. A Simple Explanation of What Net Neutrality Is All About
  136. See 11 of the Year's Best Wildlife Photographs
  137. How Much Digital Media Can Fit on History's Storage Devices
  138. What’s Up With That: Why Does Sleeping In Just Make Me More Tired?
  139. 6 Websites to Download eBooks For Free and Legally
  140. Offline over the weekend? Read all the tech news you missed here
  141. 10 Best Channels for STEM Education on YouTube
  142. Programming Languages - Hyperpolyglot
  143. Google's New Flight Search Tool Helps You Find The Best Price
  144. Total Knee Replacement: A Patient's Guide | UW Orthopaedics and Sports Medicine, Seattle
  145. Automagic: 4 Dropbox-connected apps that do the work for you | Dropbox for Business blog
  146. Google Translate Now Does Real-Time Voice And Sign Translations On Mobile | TechCrunch
  147. 10 CES Themes Likely to Resonate for Some Time
  148. Viva Las Vegas!
  149. 15 Documentaries About The Internet, Hacking, Startups & Cyberculture [Stuff to Watch]
  150. What File System Should I Use for My USB Drive?
  151. Internet Archive: Digital Library of Free Books, Movies, Music & Wayback Machine
  152. Best Computer Monitors: October 2014 - Best Monitors For The Money
  153. What You Should Know About the Amazon Kindle Voyage
  154. Most Popular Place to Buy Computer Parts: Newegg
  155. Plastc wants to replace your entire wallet with a single card
  156. Logitech K480 Multi-Devices Bluetooth Keyboard
  157. 50 Little-Known Ways Google Docs Can Help In Education | Edudemic
  158. Amazon.com: Business Analysis: Best Practices for Success (IIL/Wiley Series in Business Analysis) eBook: Steven Blais: Kindle Store
  159. Mozilla launches Open Badges 1.0, delivers virtual kudos for real skills
  160. Visual Network Simulator To Teach Basic Networking?


  1. FCC formally approves the T-Mobile-Sprint merger
  2. Has shopping died?
  3. Google wants to give doctors web-like searches for medical records
  4. Google’s Big .New Thing Is Here to Simplify Your Life
  5. HBO Max to Be Free for HBO Subscribers and AT&T Customers
  6. Facebook launches a news section - and will pay publishers
  7. A face-scanning algorithm increasingly decides whether you deserve the job
  8. An Apple device like nothing we’ve ever seen before is launching next year
  9. Los Angeles Fire Department wants to double its drone fleet
  10. Facebook’s Mark Zuckerberg defends political ad rules, says digital speech is new ‘fifth estate’
  11. Surface Neo and Surface Duo tell you everything about Microsoft's future | ZDNet
  12. eBay, Visa and Mastercard pull out of Facebook's Libra cryptocurrency
  13. Apple Glasses: Release Date, Price, Specs, Leaks and More
  14. Google and Levi's built a new gesture-sensing smart jacket
  15. Apple Arcade and Google Play Pass will be totally different stores
  16. 10 most important tech trends of the decade
  17. Microsoft Surface: Saving the future of PCs
  18. Are Dropbox's Paid Plans Worth It?
  19. Microsoft doesn’t think Windows is important anymore
  20. Microsoft's new hardware strategy should worry Apple and Intel | ZDNet
  21. Dropbox launches Spaces, its ‘smart’ collaboration workspace
  22. Why is Dropbox reinventing itself? – TechCrunch
  23. Why Facebook and Amazon have joined the race to bring computing to your face
  24. As Amazon floods the market with Alexa devices, the business model is getting fresh scrutiny
  25. These are the huge differences between Apple Arcade and Google Play Pass
  26. Amazon's new Echo Frames smart glasses bring Alexa to your face for $180
  27. iOS 13: Apple's big BYOD improvements help enterprise pros
  28. Amazon creates a huge alliance to demand voice assistant compatibility
  29. Kodak Is Ready for an Instant Camera Comeback
  30. The iPad Can Finally Replace a Laptop for Most People
  31. Google is bringing Assistant to people without internet access – TechCrunch
  32. Redesigning business processes for digital success
  33. Hands on with Apple Arcade in iOS 13
  34. Researchers: AI surveillance is expanding worldwide
  35. How Much Would You Spend on Streaming Services Per Month?
  36. Bill Gates Says Big Tech Companies Shouldn’t Be Broken Up
  37. Amazon Music rolls out a lossless streaming tier that Spotify and Apple can’t match
  38. The Shift to Electric Vehicles Propels a Strike Against GM
  39. Google Fi now offers an unlimited plan
  40. Apple as a service: One day you'll rent it all...
  41. Will Samsung kill the Galaxy Note series next year? - SamMobile
  42. Gartner sees blockchain as ‘transformational’ across industries – in 5 to 10 years
  43. Gartner: Get ready for more AI in the workplace
  44. Artificial intelligence today: What’s hype and what’s real?
  45. Walmart takes its $98 Delivery Unlimited service nationwide
  46. Apple exec confirms cryptocurrency is on company radar
  47. The Most Incredible Gadget Apple Plans to Introduce This Fall Is Something You Never Saw Coming (Here's Why It's Brilliant)
  48. Amazon is planning to bring a biometric payment method to Whole Foods
  49. Steve Wozniak says Apple should have broken up years ago
  50. Wi-Fi 6 will double your network's range and triple its speed -- once you upgrade your router, phone, PC, and everything else
  51. Verizon automatically enrolling customers in free robocall-blocking service
  52. 8 technologies that will disrupt business in 2020
  53. Marriott to Expand Its Home-Sharing Business in a Challenge to Airbnb
  54. Restructuring IT for the digital age
  55. What iPhone? Apple's push toward services begins
  56. Smart TVs Are Cheaper Than Ever, and It's Because They're Selling Your Data
  57. Return your Amazon orders to any Kohl's store starting in July
  58. 7 steps to revenue-driven IT
  59. Apple settles with Qualcomm - the 5G iPhone looks more real (u)
  60. Will Apple need to spin out its services business?
  61. 3 signs you’re going overboard with cloud features
  62. 12 ways IT can create business value in 2019
  63. How AI is helping the help desk
  64. Google Needs to Grow Its Cloud Business—Very Carefully
  65. T-Mobile's streaming TV service will include Viacom channels
  66. Walmart partners with Google on voice-enabled grocery shopping
  67. Huawei's Problem Isn't Chinese Backdoors. It's Buggy Software
  68. The emerging 737 MAX scandal, explained
  69. Facebook Charged With Violating Fair Housing Laws
  70. What you should know about serverless computing before you start
  71. McDonald's Bites on Big Data With $300 Million Acquisition
  72. Google appoints an “AI council” to head off controversy, but it proves controversial
  73. Apple event 2019: Apple Card, TV Plus, News Plus, Arcade and everything just announced
  74. XaaS: Making the shift to services-oriented IT
  75. Top IT spending priorities for 2019
  76. Google's Netflix-like Stadia instantly makes it a video game powerhouse
  77. Google unveils Stadia cloud gaming service
  78. Google Spent Years On a Secret New Plan to Attack a $140 Billion Industry. It All Starts Tomorrow
  79. What customer-centric IT really looks like
  80. 4 takeaways from Apple and Qualcomm's big patent fight
  81. Apple dealt legal blow as jury awards Qualcomm $31 million
  82. How a 50-year design came back to haunt Boeing with its troubled 737 Max jet
  83. Here's how New T-Mobile plans to disrupt the current US in-home broadband market — and why it will be successful
  84. Amazon took over the $176 billion market for cloud computing. Now it's using the same playbook in logistics.
  85. Fitbit CEO James Park talks lessons learned from the company’s struggles
  86. Amazon Almost Killed Best Buy. Then, Best Buy Did Something Completely Brilliant
  87. New Wearables Cut Health Care Costs With Better Monitoring
  88. Facebook sues Chinese companies for selling fake accounts
  89. Facebook faces backlash over users' safety phone numbers
  90. No, Data Is Not the New Oil
  91. AT&T Breaks Up Turner, Bulks Up Warner Bros. in Major WarnerMedia Overhaul
  92. WSJ: Amazon to open new US grocery chain separate from Whole Foods
  93. Google looks to leave passwords behind for a billion Android devices
  94. Walmart Joins Amazon in Chase for Ad Dollars
  95. J.P. Morgan to launch a U.S. dollar-backed cryptocurrency
  96. Microsoft Wants Part Of This $180-Billion Industry
  97. AI, machine learning, and deep learning: The complete guide
  98. AR and VR bring a new twist to collaboration
  99. Information Technology Outsourcing Market (ITO) report for 2019 made available by top research firm
  100. Amazon Gobbles Up Eero to Round Out Its Smart Home Plan
  101. FDA approves AI-powered diagnostic that doesn’t need a doctor’s help
  102. T-Mobile/Sprint merger turns two disruptors into one “mega company,” Dems warn
  103. Maybe Ron Johnson Was Right About J.C. Penney After All -- The Motley Fool
  104. IoT for retailers: opportunities and challenges
  105. IBM Buying Open Source Specialist Red Hat for $34 Billion
  106. IBM's acquisition of Red Hat is huge news for the Linux world
  107. Forget Watson, the Red Hat acquisition may be the thing that saves IBM
  108. IBM to acquire Red Hat in deal valued at $34 billion
  109. 5 ways AI is transforming customer experience
  110. How Enterprises Can Help Build Ethical AI Strategies
  111. Amazon's Echo devices get redesign on the way to world domination
  112. Tech Disrupted the World. Who Will Shake up the Next 25 Years?
  113. Fitbit buddies up with Google for better health
  114. How to build a business case for Artificial Intelligence
  115. Sprint and T-Mobile Are Officially Merging, and It's Terrible
  116. T-Mobile, Sprint agree to merge as America's national wireless carriers shrink from 4 to 3
  117. Ford will stop selling most of its cars in North America
  118. Battle between Apple and Microsoft is over | Cult of Mac
  119. Ford to stop selling every car in North America but the Mustang and Focus Active
  120. How Artificial Intelligence Will Revamp Education
  121. Artificial intelligence will wipe out half the banking jobs in a decade, experts say
  122. Car 'subscriptions' could make ownership obsolete
  123. How Artificial Intelligence Is Revolutionizing Business In 2017
  124. Five CIO tips for building an IT strategy in the digital age
  125. The psychological impact of an $11 Facebook subscription
  126. Gartner Worldwide IT Market Report Predicts Fastest Growth in Decade
  127. Developing the right IT strategy - Supporting business strategy with technology
  128. 4 Models Of The Shopping Mall Of The Future
  129. How blockchain will disrupt Google, Apple, Amazon, and Facebook

Student Info

  1. This 12-course bundle will teach you how to be an ethical hacker for $39
  2. Best practices for data modeling
  3. 60 Cybersecurity Interview Questions [2019 Update] | Daniel Miessler
  4. Top 17 project management methodologies — and how to pick the best for success
  5. 12 blockchain-related jobs to consider in 2020
  6. IT Career Roadmap: Infrastructure software manager
  7. Gartner: 10 infrastructure trends you need to know
  8. How to Answer 'Why Do You Want to Work Here?' in a Job Interview
  9. Software jobs pay twice the national average
  10. 8 hot IT security jobs and what they pay
  11. 7 High-Paying Jobs You Can Get Without a 4-Year College Degree
  12. Top 15 data science professional development certificates
  13. The highest-paying entry-level job in tech pays $113,254 a year—here are the other 9
  14. Blockchain jobs remain unfilled, while skilled workers are being poached
  15. 11 business intelligence certifications to advance your BI career
  16. 15 top data science certifications
  17. A movement to prepare students for the future of work
  18. The Deeper Education Issue Under the College Bribery Scandal
  19. Demand for blockchain engineers is ‘through the roof’
  20. 10 IT skills paying the highest premiums today
  21. What Frameworks and Languages Are Developers Using in 2019?
  22. Best-paying programming languages, skills: Here are the top earners | ZDNet
  23. AWS Training and Certification - Machine Learning
  24. Amazon says it’s making freely available the same machine learning courses that it uses to teach its own engineers
  25. 10 Impressive Questions to Ask in a Job Interview
  26. Cybersecurity, AI skills to dominate IT staff hires in 2019 | ZDNet
  27. 10 must-have skills for ITSM pros
  28. Gartner: IT spending to hit $3.8 trillion; enterprise software, IT services outlays lead way
  29. The 15 top-paying certifications of 2018
  30. According to Hiring Managers, 1 Type of Resume Makes You Look Desperate
  31. This Is The #1 Resume Lie That'll Cost You A Job According To Hiring Managers
  32. The 7 most in-demand tech jobs for 2018 — and how to hire for them
  33. The future technology skills that will keep you in work
  34. AI and the Future of Work
  35. More Companies Teach Workers What Colleges Don’t
  36. The blockchain market is hot; here's how to learn the skills for it
  37. Net Neutrality: Everything You Need To Know
  38. How IT Professionals Can Survive, and Thrive in, an Automated World
  39. Demand for cyber security skills outstrips internal supply, research finds
  40. 9 Things to Consider Before Accepting a New Job
  41. The Interview Question That's Always Asked (and How to Nail It)
  42. How to spot 4 common lies employers tell job applicants
  43. Scan Your Social Profiles Like a Potential Employer Will
  44. 10 Great Places to Work at Large, Medium and Small Tech Companies
  45. Old School May Be Better Than High-Tech.
  46. Americans who haven't gone to college are way worse off today than 40 years ago
  47. Skills shortage tops Security Serious agenda
  48. Top 10 most desired traits for cybersecurity job candidates
  49. The next IT jobs boom? The internet of things
  50. 10 in-demand jobs for workers without a bachelor's degree
  51. Why Tech Pros Need to Develop Soft Skills
  52. Facebook helped advertisers target teens who feel “worthless”
  53. Amazon’s CEO Perfectly Explains AI in Just Two Sentences
  54. Computerworld's IT Salary Survey 2017 results
  55. Cybersecurity jobs are there for the taking. Are you ready?
  56. Python on the Web: The Amazing Things You Can Build
  57. JavaScript Is Still Most Popular Language, but Developers Love Rust
  58. Science: 81 Percent of People Lie in Job Interviews. Here's What Top Companies Are Doing Instead
  59. Five Questions You Absolutely, Positively Must Ask On A Job Interview
  60. A woman who has reviewed over 40,000 résumés outlines the 8 most annoying mistakes she sees
  61. Tutorials for Spring AOP, Gerrit, Spring MVC, Apache Solr, Excel Power View, Sencha Touch, Tex Commands, Agile Testing, Apache Tajo, C++ Library, MariaDB, SAP QM, SAP SOLMAN, SAP SCM, MS Access, KoaJS, OAuth2.0, Scrapy, SAP CCA, SAP PM, SAPUI5, Cognos, Internet of Things, Rural Marketing, Trampolining, Golf, CakePHP, SAP EWM, Web Dynpro, Angular2, Framework7, Arduino, CherryPy, Firebase,SAP C4C, SAP Dashboard, SAP PI, ExpressJS, Design Thinking, Internet Security, PyGTK, Apache Drill, Excel Charts, Elastic Search, Computer Security, Extreme Programming, Behavior Driven Development, Conversion Rate Optimization, SAP Basis, Business Law, Kanban, Erlang, SAP Payroll, ASP.Net WP, PouchDB, MFC, SAP HR, Yii, Clojure, Aurelia, CoffeeScript, CPanel, Laravel, SAP Webi, MS SQL Server, pinterest, Indian Polity, Teradata, Windows10
  62. 10 Websites for Ethical Hacking Tutorial - Free
  63. The Best Questions to Ask in Every Job Interview Round
  64. IT Pros Need More Training on Linux and the Cloud
  65. Robert Half Report Lists the Most In-Demand IT Jobs In 2017
  66. It took Sheryl Sandberg Exactly 2 Sentences to Give the Best Career Advice You'll Hear Today
  67. What Employers Want to Know During Job Interviews
  68. How To Answer 'What's The Lowest Salary You Would Accept?'
  69. Learn ethical hacking from scratch
  70. Technology skills demand accelerates outside the IT department
  71. So You Want to be a Functional Programmer (Part 1)
  72. The 15 most popular computer languages, according to the Facebook for programmers
  73. Why Is JavaScript the Programming Language of the Future? - DZone Web Dev
  74. How to Use Markdown in WordPress to Improve Workflow - Make Tech Easier
  75. Ten Self-Defeating Gestures of Job Candidates
  76. A common job-interview question about money is a trap, and you should never answer it directly
  77. Comparing Struts 1 and 2
  78. IT Salary Survey 2016: Do certifications really help?
  79. IT Salary Survey 2016: Highlights
  80. IT Salary Survey 2016: 10 tech specialties with rising salaries
  81. How to Answer "Tell Me About a Time You Failed" in an Interview
  82. Top 10 Tools for a Free Online Education
  83. 5 Interview Mistakes You Didn't Know You’re Making
  84. The 15 Most Popular Free Online Courses for Professionals
  85. The 15-step guide to nailing any job interview
  86. WebServlet annotation examples
  87. Help - Eclipse Platform
  88. Companies Plan to Hire More Linux Pros
  89. Linux Treasures: 11 Sublime Native Linux Apps That Will Make You Want To Switch
  90. The Ten Best Tech Jobs in America
  91. 15 of the Best Courses on Udemy for Self-Improvement
  92. This 'Smart' Whisky Bottle Must Be Stopped
  93. RadioShack Corporation — Our Company — History — Timeline
  94. IT jobs market booming in the Southwest
  95. What I Wish I Knew When I Started My Career as a Software Developer
  96. How to Negotiate Your Salary When You Don't Have Any Work Experience
  97. Higher education: The university experiment : Nature News & Comment
  98. How To Improve Your Programming Career Opportunities
  99. Google gives students unlimited cloud storage
  100. HTG Explains: What is a File System, and Why Are There So Many of Them?
  101. a_message_from_everyone_to_it_workers
  102. Advice I Wish Someone Had Given Me for My First Job
  103. America Has Hit “Peak Jobs” | TechCrunch
  104. 2013 job watch: Top 11 metro areas for tech jobs
  105. How to Tackle Three of the Toughest Interview Questions
  106. Use the "Embarrassment Test" to Help Make Difficult Decisions
  107. Google Developers Live
  108. 2013 IT salaries: 15 titles getting the biggest pay raises
  109. 12 effective habits of indispensable IT pros
  110. The geek skills challenge: 10 talents worth mastering
  111. Support - Forums - General Forums - CrossOver for free on Wednesday, October... - Discussion of Windows on Mac and Linux
  112. Texas Tech University Libraries :: Lynda.com
  113. Adobe - Adobe Education Store - North America - Adobe Creative Cloud Student and Teacher Edition
  114. The Interview Question That's Always Asked (and How to Nail It)
  115. Java, C, PHP: 15 Programming, IT Skills That Are Thriving on Wall Street
  116. How to Stand Out in an Interview
  117. SecTools.Org Top Network Security Tools
  118. Hacking Videos
  119. The Hardest Job Interview Questions—And How to Ace Them
  120. 100 Best Places to Work in IT 2012 - Computerworld
  121. Outdoor Leadership Programs | Outward Bound
  122. Apply for a Tech Position That Doesn't Exist - Wired How-To Wiki
  123. 200+ Most Common Interview Questions & 1000+ Answers
  124. avoid-a-me-resume-and-avoid-getting-ignored-by-yet-another-employer
  125. Study: Salaries Poised to Rise for Workers With Mobile, Cloud, UI Skills | PCWorld Business Center
  126. What Questions Should I Be Ready to Answer at Just About Any Job Interview?
  127. How to Answer "What Is Your Greatest Weakness?"
  128. Lynda
  129. Three reasons why asking risky questions reduces risk
  130. Pepper Your Resume with a Company's Cultural Keywords to Help Beat the Screeners
  131. 15 things successful CEOs want you to know
  132. CEO: The 5 Things I Look for In a Great Job Interview | LinkedIn
  133. 8 nice text-based applications in Linux ~ Linux and Life
  134. The Strange Birth and Long Life of Unix - IEEE Spectrum
  135. Five Best Online File Storage Services
  136. Occupational Hazards: 7 hot jobs for 2012
  137. Hulu - CNBC Originals: Code Wars - Watch the full episode now.
  138. When passwords attack: the problem with aggressive password policies
  139. 0,2817,2395429,00.asp
  140. 68 great ideas for running a security department
  141. discover-whats-new-in-css-4
  142. 5 Tech Pros Companies Want to Hire | PCWorld
  143. High-speed Ethernet Planning Guide | PCWorld
  144. Web server security
  145. Newegg.com - LIAN LI Lancool PC-K56 Black 0.8 mm SECC, Plastic + Mesh ATX Mid Tower Computer Case
  146. TR's fall 2011 system guide - The Tech Report - Page 1
  147. Choose an Irrelevant Skill When Asked "What Are Your Weaknesses?" in a Job Interview
  148. 10 Cloud Career Skills - PCWorld


  1. Utah county moves to expand mobile voting through blockchain
  2. IBM launches blockchain-based supply chain service with AI, IoT integration
  3. Why Wells Fargo plans to pilot its own cryptocurrency
  4. How pharma will soon use blockchain to track your drugs
  5. Why wearables, health records and clinical trials need a blockchain injection
  6. FedEx CIO: It’s time to mandate blockchain for international shipping
  7. How blockchain is becomming the 5G of the payment industry
  8. IBM launches global blockchain-based payments network
  9. The difference between blockchain and a database explained
  10. Blockchain: The complete guide
  11. Sharding: What it is and why many blockchain protocols rely on it
  12. W. Va. says mobile voting via blockchain went smoothly
  13. Blockchain for business: 6 promising pilots
  14. Walmart, Sam’s Club tell suppliers to get on blockchain network
  15. 1. How Blockchain Works
  16. Here's what two executive surveys revealed about blockchain adoption
  17. W. Va. to use blockchain-based mobile app for mid-term voting
  18. What is blockchain? The most disruptive tech in decades
  19. New blockchain ledger will let you sell personal healthcare data
  20. BMW, GM, Ford and Renault launch blockchain research group for automotive industry
  21. Blockchain growth makes developers a hot commodity
  22. Will privacy be a stumbling block for blockchain?
  23. Someone wrote a kids' book to explain bitcoin and blockchain
  24. Can Blockchain Fix the Opioid Epidemic? Intel Wants to Find Out
  25. Hackers steal over $150,000 in cryptocurrency with DNS scam
  26. How blockchain can give readers more power on the internet
  27. Explainer: What is a blockchain?
  28. Bank Of America Seeks Patent On Blockchain-Based Data Storage System
  29. Blockchain to ‘radically’ transform anti-fraud, anti-money-laundering efforts
  30. How blockchain could solve the internet privacy problem
  31. Google will soon bring a blockchain-like system to the cloud
  32. Startup Xage Launches Blockchain-Protected IIoT Security
  33. IFTF: Blockchain Futures Lab
  34. Why Blockchain Will Serve New IT Purposes in 2018
  35. As blockchain heats up, so do job prospects for devs
  36. UpNest Featured in ABC 6 News
  37. 5 ways blockchain is the new business collaboration tool
  38. IBM sees blockchain as ready for government use
  39. Looking To Integrate Blockchain Into Your Business? Here's How
  40. Looking To Integrate Blockchain Into Your Business? Here's How
  41. Microsoft to test blockchain-based self-sovereign ID system
  42. Blockchain: The Complete Guide
  43. How blockchain can secure the IoT
  44. Blockchain - Wikipedia
  45. The Basics of Blockchain Technology, Explained in Plain English
  46. How Amazon Is Quietly Entering The Blockchain And Cryptocurrency Boom
  47. Blockchain and cryptocurrency may soon underpin cloud storage
  48. What Is Blockchain?

Cloud Computing

  1. IBM Opens Up Series of Security, AI and Cloud Initiatives
  2. What is a data lake? Flexible big data management explained
  3. 4 hidden cloud computing costs that will get you fired
  4. IT Turning to the Cloud to Handle Growing Big Data Demands
  5. Cloud Storage Comparison 2018: Compare Security & Features
  6. The 3 reasons CIOs have become cloud-first
  7. How Cloud Computing Impacts Corporate Security for Better or Worse
  8. What is cloud computing? Everything you need to know from public and private cloud to software-as-a-service | ZDNet
  9. How the Internet of Things will affect security & privacy
  10. Lima: Your Personal Cloud Storage Review
  11. Opinion: The FCC's Net Neutrality Victory Is Anything But | WIRED
  12. Best practice for using cloud computing in Europe 2013 (Part 1)
  13. 8 questions that will dominate enterprise cloud adoption
  14. Apple iOS 6 iCloud enhancements bring new enterprise problems
  15. Cloud computing is entering its teen years | Digg Technology
  16. VMware's WSX Does Virtual Desktops With HTML5 | Cloudline | Wired.com
  17. Dropbox just integrated with Facebook, making it easy to invite friends to shared folders | Digg Technology
  18. Jolicloud Me to Integrate Content From Multiple Online Services | PCWorld Business Center
  19. Jolicloud Me Delivers Personal Cloud Search, More | Cloudline | Wired.com
  20. What the cloud really means for your IT job
  21. 'Personal Cloud' to Replace PC by 2014, Says Gartner | Cloudline | Wired.com