Parents take time to monitor child’s cell phone use

Parents take time to monitor child’s cell phone use

19 June 2012

Parents of teens in this day and age are fully aware of how inseparable kids and their cell phones are. However, it is important for parents to develop guidelines for cell phone use, so the teen does not spend their entire day texting their friends, according to The Reporter News. “They were in the same [...]

Read the full story

Posted in Parental ControlComments (0)

Hacker accessed millions of LinkedIn passwords

Hacker accessed millions of LinkedIn passwords

13 June 2012

The professional social media site, LinkedIn, has become victim to hackers, and 6.5 million users’ passwords have been posted to a Russian hacker site. According to CNET, there are 150 million users on LinkedIn, and now millions of them may have their password stolen. LinkedIn passwords are encrypted using an algorithm SHA-1, which is known [...]

Read the full story

Posted in Computer MonitoringComments (0)

New cell phone in Japan can identify radiation levels

New cell phone in Japan can identify radiation levels

05 June 2012

Japanese residents are very worried about radiation since last year’s nuclear meltdown. This concern is as rampant as ever – even 14 months since the tsunami hit northeastern Japan and set off meltdowns and explosions at the Fukushima Dai-ichi nuclear plant. As a result, according to The Associated Press, a new cell phone was developed [...]

Read the full story

Posted in Cell Phone TrackingComments (0)

Attention small business owners: your Mac doesn’t make you safe

Attention small business owners: your Mac doesn’t make you safe

29 May 2012

Small business owners must decide what brand of computer, mobile device and other forms of technology they want their employees using. Preferences vary, but many entrepreneurs opt for Apple products, in part because they are seen as more secure and less prone to hacking than other brands. However, a recent article on CultOfMac.com points out [...]

Read the full story

Posted in Employee MonitoringComments (0)

London develops new system to extract mobile data from suspect’s cell phone

London develops new system to extract mobile data from suspect’s cell phone

22 May 2012

The Metropolitan Police in London have developed a new system that allows the officers to extract all mobile phone data of a suspect who is taken into custody. The data includes call history, texts and contacts – and is performed even if charges have not been filed yet, according to BBC. The new system will [...]

Read the full story

Posted in Cell Phone TrackingComments (0)

Texting while walking becoming a serious issue

Texting while walking becoming a serious issue

17 May 2012

A new study conducted by researchers from Stony Brook University found that texting while walking can cause a great deal of accidents. According to Long Island Business News, the study showed that the gait velocity was reduced when the person was texting and navigational errors were made. The researchers came to these results by asking [...]

Read the full story

Posted in Cell Phone TrackingComments (0)

Text message scammers growing in popularity

Text message scammers growing in popularity

11 May 2012

Many cell phone users are familiar with the occasional text message from an unknown number that tells them they won a prize – and most do not click on the link. However, some mobile owners are not familiar with this and end up being the victim of a yet another technological scam. Text message scams [...]

Read the full story

Posted in Cell Phone TrackingComments (0)

Weak laws allow for cyberbullying, debate arises about free speech

Weak laws allow for cyberbullying, debate arises about free speech

08 May 2012

Bullying has been an issue for decades, and this problem has made its way to the forefront of a number of parents’, educators’ and students’ minds. However, the internet has opened up an entirely new platform for kids to be bullied, and many parents are uneasy about the lack of legislation. Free speech vs. cyberbullying [...]

Read the full story

Posted in Parental ControlComments (0)

1 3 4 5 6 7 12