Sprint and T-Mobile defend unlocking policies

January 18th, 2015

Criticism prompts researcher who dinged carriers to consider amending his carrier scorecard

Sprint and T-Mobile separately defended their smartphone and tablet unlocking policies on Wednesday following criticism from independent researcher Sina Khanifar.

Android 5.1 Details: What’s changed?

January 18th, 2015

Android Lollipop is an impressive piece of software but it didn’t arrive without its problems. The adoption process was slow, even for Nexus devices which for the first time got beaten by OEM phones in their own game of fast updates. Then there’s the fact that the Nexus 6 that functioned as the insignia-device for the new platform iteration faced serious performance annoyances due to NAND bottlenecking through forced encryption.

NSA planted surveillance software on hard drives, report says

January 17th, 2015

The National Security Agency is able to infect hard drives with surveillance software to spy on computers, Reuters said on Tuesday, citing information from cyber researchers and former NSA operatives.

In a new report, Kaspersky revealed the existence of a group dubbed The Equation Group capable of directly accessing the firmware of hard drives from Western Digital, Seagate, Toshiba, IBM, Micron, Samsung and other drive makers.

Destroying your hard drive is the only way to stop this super-advanced malware

January 17th, 2015

A cyberespionage group with a toolset similar to ones used by U.S. intelligence agencies has infiltrated key institutions in countries including Iran and Russia, utilizing a startlingly advanced form of malware that is impossible to remove once it's infected your PC.

Kaspersky Lab released a report Monday that said the tools were created by the “Equation” group, which it stopped short of linking to the U.S. National Security Agency.

Iceland and beyond: Exploring offshore web hosting

January 7th, 2015

When shopping for a web host, some business owners first look at solutions that are close to home. That’s a natural response, but in many cases, an offshore host might make more sense.

Here’s a look at some of the advantages that an offshore web host can provide.

The four Mac security options everyone should know

January 5th, 2015

As our lives increasingly go digital, security is a major concern not only for the various online services we use, but also for the devices on which we save our data. Chances are that if you’re reading this article, you own a Mac. And on your Mac, you’d like much of the work you do on it to be kept private.