X

Target App Security Hole Leaves Users Vulnerable

December 16, 2015 at 2:17 pm By

Researchers have discovered a security hole in the Target mobile application that could leave users vulnerable. The hole was discovered by researchers from Avast, a security company. Information about the security hole was made public through a blog post detailing the dangers of the breach.

Control Tangible Objects in An Augmented Reality With An App

December 15, 2015 at 3:03 pm By

What if you could change the way some of the “smart objects” or “smart appliances” work in your home? An MIT researcher by the name of Valentine Heun wants to make sure that all of the fun you have in purchasing a smart object isn’t expensed after opening it up and setting it up. He is working to develop a…

Twitter Says Users Should Be Cautious of ‘State-Sponsored Hacks’

December 14, 2015 at 2:20 pm By

It’s beginning to look as if your best bet in keep your information safe from the clutches of hackers would be to stay off the internet and social media completely. New reports stated that Twitter is warning “some” users of targeted security breaches. The company also stated that the breaches may have been carried out by state-sponsored hackers.

Should The Customer Always Come First In Web Design?

December 11, 2015 at 2:15 pm By

As a designer you could look at what a company produces and figure out a way to build or update a site to the specs necessary. It can be a little messy when the customer begins imposing their input but one report makes the cases that the customer should always come first in web design.

Hackers Using Malvertising to Infect Computers

December 10, 2015 at 2:25 pm By

When all approaches have been exhausted by hackers, there is always another way for them to find a way into your computers. New reports claim that hackers are buying ad space which allows them to upload malicious ads. This practice is called malvertising according to Wired.

Ways To Properly Protect Your iPhone

December 9, 2015 at 2:32 pm By

We’ve all been in the position where we are reaching for our cellphones and it’s just not there. You took your eyes away from it for one minute and now it’s gone. Your photos, videos and other personal information is now in the hands of someone else, however, CNET outlines security steps that could save your information and keep it…

President Obama Wants Social Media Networks to Fight ISIS

December 8, 2015 at 2:32 pm By

While hackers like the Anonymous team vowed to enter the digital fight against ISIS, President Barack Obama is now asking other digital mediums to enter the fight. The president is seeking help from social media companies like Facebook in order to help end the threat of ISIS.

Quick SEO Web Design Tips For Optimization

December 7, 2015 at 3:37 pm By

All web owners or blog site wants to be the first to appear in Google or any other search engine when their product or expertise is searched. Business 2 Community has outlined “5 Web Design Techniques to Make Your Website Search Engine Friendly.”

Federal Web Design Standards Turns Into Drupal and WordPress Themes

December 4, 2015 at 2:18 pm By

The U.S. Government Federal website will be seeing a more uniformed look thanks to the U.S. Digital Service and General Services Administration’s 18F software development team who are integrating unified design standards across the board. The move was reported by Fierce Government IT, who details the move.

Researcher Hacks Into Hello Barbie

December 3, 2015 at 2:44 pm By

After a hacker was able to infiltrate VTech accounts it seemed as if the worry surrounding child tech toys had come at one of the worst possible times of the year. Now, a researcher has managed to hack into a Hello Barbie doll exposing even more vulnerabilities in some of the toys that are probably on plenty of Christmas lists.