Although it is the children of today who have never known a world in which mobile phones do not exist, it is the parents of these children that are causing serious problems -- and not just by using phones while driving.
The German Lifeguard Association (DLRG) has warned that children are dying because of their parents' phone usage. The organization says that rather than keeping an eye on their kids as they swim, parents are "fixated by their smartphones" and fail to notice when their youngsters get into trouble.
Yesterday, Microsoft rolled out its new Your Phone app for Windows 10. Previously only available for Windows Insiders, the app allows Android users to access their photos on a Windows 10 PC.
If you’ve been wanting to try out the app, we’ve some bad news for you. You’ll once again need to be an Insider to use it.
Most Commented Stories
Thanks to copyright issues, Classic Shell replacement Classic Start is no more… but it's not bad news
Today in Tech History
5G, carrier updates, mergers -- we rang in 2018 with a slew of big wireless predictions. But where do these predictions stand now at the year’s halfway point? Let's take a look, starting with a big one -- 5G is coming
Ah, 5G. We’ve read about it, researched it, and heard the predictions that it’ll be available by the end of 2018. But is it all true? Well, AT&T claims it plans to launch 5G in 12 cities -- including Atlanta and Dallas -- by year’s end. The carrier giant has already taken 5G for a test drive with an introduction to visitors of Magnolia Market in Waco, Texas. The trial area, which sees approximately 5,000 visitors each day, was a real-world experiment for AT&T’s new 5G capabilities allowing the company to evaluate performance and visitor response.
According to a new FBI report, businesses lost more than $676 million as a result of email fraud in 2017 -- up 88 percent from the year before. Clearly, businesses are losing the war against email scammers, as phishing attacks have become increasingly sophisticated and widespread.
Phishing is a method of social engineering (i.e. deception) used to gain access to a social media account, bank account or another protected resource. Hackers typically use an email or text message to trick the user into providing login information. Once the user reveals a username and password, the attacker will hijack the account. The outcome can be as devastating as a fully drained bank account. Frankly, all individuals and businesses should take phishing seriously.
If you updated your Marvel Contest of Champions (MCoC) app recently, you might have noticed something -- your phone heating up to the point of not being usable.
Although version 19.0 of the game was supposed to fix some bugs, in reality, it introduced a new problem. Players noticed shortly after downloading the update that their phones started severely overheating when they tried to play the game.
"An investment in knowledge always pays the best interest." -- Benjamin Franklin
The same thought rings true in the online business sphere. Apart from assimilating the best strategies in your field, you also need to build and share your knowledge in order to win your audience’s vote of confidence. Remember, people flock to those who have proven their expertise in their respective niches. It isn’t rocket science: You can’t just expect your visitors to subscribe to your blog, subscribe to your services, or purchase your products if they don’t trust your brand. That’s why marketers invest in branding strategies that not only help them reach their target audience, but also earn their approval by providing valuable content.
Previously only available to OneDrive for Business users, Microsoft is now rolling out OneDrive folder protection to everyone.
Also referred to as "known folder move" -- and rather copying the Backup and sync app from Google -- OneDrive folder protection makes it possible to back up your important files and folders to the cloud. Here's how to get started.
We reported last week on a report highlighting how many security professionals are turning to a life of cybercrime.
In a follow up research piece, Wendy Zamora at Malwarebytes, has been looking at the psychology, motivations and other underlying factors that drive people to take part in cybercrime.
Recording phone calls is dodgy territory legally speaking, but whether you choose to do it depends on where you are in the world, and whether you're concerned about complying with the law. Since Marshmallow, Google has made it difficult to record calls on Android phones by killing the recording API, but this has not stopped third party developers finding ways around it.
But with Android 9 Pie, Google has made it impossible for apps such as Call Recorder - ACR and BoldBeast Android Call Recorder to be used to record calls. Unless, that is, you're willing -- or able -- to root your handset.
We handle support for people who purchase software and the number one issue we consistently experience is the inability to install updated versions of their favorite software.
There are very basic reasons, too. When you first install your software, you’re often asked to reboot. After this procedure, it’s in use. The application may start when you boot your PC, run in the background, checking your system and much more. When you decide to upgrade, people expect to simply install the latest version on top, forgetting the application is being used and that Windows cannot remove active files.
The second quarter of 2018 has seen a significant increase in Trojan activity, seeing them become the leading type of malware, according to the latest report from Comodo Cybersecurity.
At the same time there has been a slight decrease in cryptomining software. However, this has gone hand-in-hand with a sharp increase in their harmful capabilities, including better concealment and stronger persistence.
Firewalls remain an important element of security architecture, but many organizations are still struggling with the basics, according to a new study.
Security policy management company FireMon has released its 2018 State of the Firewall report which reveals that 94 percent of respondents believe firewalls are as or more critical than ever.
Self-service application specialist SnapLogic is announcing new integration with GitHub to automate critical elements of continuous integration and continuous delivery (CI/CD).
The integration enables system administrators to host different versions of their work, including tasks, pipelines, and projects from SnapLogic, with visibility into changes with each update.
The likes of Duolingo have made it easier than ever to learn French, Spanish, Polish, Hebrew or whatever other tongue tickles your fancy, but the language of the internet is -- arguably -- emoji. On your mobile phone, these handy little characters are easy to type, but less so on your computer.
To make things a little easier, Google Chrome now has a hidden Emoji Context Menu that you can enable. Once activated, this menu can be used to access an emoji picker to add emoji to text fields. Here's how to enable it.
Starting tomorrow -- Thursday, August 16 -- Twitter is disabling push notifications for third party clients. If you use the likes of Twitterific, Fenix or Plume, this could mean you miss out on important messages as Twitter clamps down on what third party tools are able to do.
Twitter has long had a tempestuous relationship with app developers, including its frankly bizarre token limit which effectively restricts the number of users any app can ever attract. This latest move is billed as a part of a security drive, but it's one that will impact a large number of people. There is something you can do to ensure you get Twitter notifications on your iPhone or Android handset, but it's not ideal.