Can You Hear Me Now?

Internet-connected devices are rapidly becoming commonplace in our daily lives. Smartphones, tablets, televisions, thermostats, cars, video games and even children’s toys now connect to the Internet. Many connected devices contain embedded microphones and cameras that can collect, send and share audio and video data. This creates concerns about the types of information these devices might be collecting and sharing. What’s more, many of them are “always on” — listening and watching day and night, allowing devices to respond to voice …

Mac Attack (and More): The Latest in the Tech Support Scam

En español | For six years, telephones have been ringing off the hook with alarming but bogus news: There’s a dangerous virus on your computer, and the caller – a self-described technician with Microsoft, “Windows” or an antivirus software company – says he can remove it … for a price. But now, it’s not just PC users at risk for the notorious tech support scam. Mac users (and the machines themselves) are also vulnerable – and this time, fix-it fraudsters …

Making Your Risqué Photos Less Risky

With news that hackers last weekend managed to uncover and leak nude photographs that 101 celebrities had stored on their smartphones, you may be wondering about the online security of your own salacious selfies. Don’t laugh. Such intimate photos were exchanged on Valentine’s Day 2013 by one in four everyday folks between ages 45 and 54, according to a survey by Internet security firm McAfee. And just last month, staffers with antivirus software manufacturer Avast recovered some 1,000 nude photos from …