access

Wed
24
Oct
John Lister's picture

Home Gadget Promises More Secure Email

A new gadget is designed to keep emails "totally secure and private." It comes with a big financial and convenience cost, however. Helm is promoted as an alternative to web-based email such as Gmail. It's based on the idea that such services pose a ... risk because they could be hacked or the providers forced by a court to hand over messages. Instead, Helm wants people to use a personal email server in their home - a bit like an ultra-secure mailbox. Normally email servers are bulky and require considerable technical knowledge. Device Requires Physical Key The Helm device is instead ... (view more)

Wed
10
Oct
John Lister's picture

Google+ Social Network Bites Dust amid Data Breach

Google is to shut its social network Google+. Although the service was something of a flop, the closure is more to do with a massive data exposure. Google+ launched back in 2011 and was one of several attempts by the company to compete with the ... likes of Facebook. Its main selling point was the concept of Circles, which meant that users weren't restricted to sharing posts and updates with a fixed set of friends. Instead, they could write a post that was seen by a particular group, such as work colleagues or people with a shared hobby. Facebook does have such a feature, but it's not as ... (view more)

Fri
31
Aug
Dennis Faas's picture

Explained: VPN vs Proxy; What's the Difference?

Infopackets Reader Bill K. writes: " Dear Dennis, Thanks for your excellent and concise explanations regarding VPNs (virtual private networks). I read with interest the latest article, ' Difference Between VPN Server and VPN (Service) ' and also ' ... Do I need a VPN? Are VPNs Safe for Online Banking? '. I was wondering if you could explain the difference between a VPN vs Proxy ? Which one is better? Can I use a Proxy with bit torrent or browsing the web anonymously? " My response: In this case, the term "proxy" refers to a "proxy server", which is a special use server online the Internet that is ... (view more)

Mon
27
Aug
Dennis Faas's picture

Explained: Difference Between VPN Server and VPN (Service)

Infopackets Reader Kathy S. writes: " Dear Dennis, I have been researching the difference between a VPN server and a VPN , and I am super confused. I read your article entitled ' Do I need a VPN? Are VPNs Safe for Online Banking? ' and that has ... helped a bit, but I was wondering if you could explain which one would be cheaper for me in the long run? It is cheaper to have my own VPN server or should I pay for a VPN service? " My response: A VPN server and VPN (service) operate very similar because they use the exact same technology - however, using a VPN server vs a VPN (service) are two ... (view more)

Thu
05
Jul
John Lister's picture

App Developers Could Be Reading Your Gmail

Google has confirmed that third parties may be able to read your Google email (Gmail) messages. The resulting controversy comes from a lack of clarity over its permission settings. The issue isn't about Google itself reading email messages. ... Previously, Google servers would scan email messages for keywords, then use targeted advertisements based on those keyboards whenever users logged into Gmail to read their emails. However, Google has dropped this policy last year and instead bases its ads on other information, such as Google web searches and YouTube viewing. The latest controversy relates ... (view more)

Thu
26
Oct
John Lister's picture

Amazon Couriers Could Open Your Front Door for Delivery

Amazon wants customers to let couriers have an electronic key to get inside customer homes for deliveries. The Amazon Key program also appears to be a way to promote customers buying security cameras and smart locks. The Amazon Key feature is only ... available to customers in the Amazon Prime subscription program, which includes free home delivery and access to streaming video. They'll also need a compatible camera and smart lock, with Amazon bundling the two devices together for $250 including installation. The smart lock technology can be added to an existing standard deadbolt, meaning a ... (view more)

Mon
23
Oct
Dennis Faas's picture

How to Fix: Make Windows 10 Stop Flashing on Sound

Infopackets Reader Steve T. writes: " Dear Dennis, I am using a Windows 10 PC. This past weekend, my grandchild made some changes to my PC and now every time there is sound, the screen flashes. I have searched and searched how to fix this but I am ... cannot seem to find a solution. Can you tell me how I can make windows 10 stop flashing on sound? " My response: I have not heard of this issue before but suspected it may have something to do with the "Ease of Access" mechanism which has been built into Windows as far back as Windows XP. According to Microsoft, Ease of Access "helps make your PC ... (view more)

Thu
14
Sep
John Lister's picture

Windows 10 Gets Privacy Boost

Microsoft is to give Windows 10 users more details about exactly what an app is able to do on their computer. It's a similar security measure to that available on some mobile device apps. Until now, apps only usually have to get a Windows user's ... permission when they want to access location data, for example in a mapping tool. That's changing with the 2017 Fall Creators Update, the next major twice-yearly feature update for Windows 10. Microphone and Webcam Access Need Permission The change means apps will need the user's permission to access key hardware components on the computer such as a ... (view more)

Tue
04
Jul
John Lister's picture

Windows 10 Gets Anti-Ransomware Feature

Microsoft is adding a new feature to Windows 10 that could make it harder for ransomware to lock up files. It could be useful, but is certainly not a complete defense. The feature, called "Controlled Folder Access," is part of the Windows Defender ... security tool and is already being tested by users who've volunteered for advanced access to Windows 10 updates. The idea is that specific folders can be protected which means that only specified applications or programs can create, alter or delete files in those folders. This includes encrypting the files, which is the key tactic ... (view more)

Tue
09
May
John Lister's picture

Phishing Scammers Try New Twist

An estimated one million people around the world received a recent phishing email, though it only posed a risk for around an hour before Google stepped in to stop the scam in its tracks. Victims of the scam may have inadvertently given attackers ... control of their email accounts. The attack involved a bogus email claiming that a contact tried to share a document with the recipient using Google Docs. While only a small proportion of people use Google Docs, the attackers appear to have been playing the numbers game. Attackers Accessed Emails and Contacts Unlike most phishing scams, the attackers ... (view more)

Pages

Subscribe to RSS - access