BullGuard

29 posts categorized "Tech News"

Google Glass: The New Trend In Eyeware

Posted by kdunlaevy@gmail.com

Google_glasses_blogAs with any new product launch, there have been leaks about what new capabilities the Google Glass will bring with it. Being the first of its kind, the mind boggles at what our future might look like, and if all goes well, we won’t be able to live without it.

 

» Read more


Category: Internet Security, Tech News Comments

The New 2 Step Apple Verification Process. How To Use It Or Not To Use It

Posted by kdunlaevy@gmail.com

Apple two step verification_blogIn March, Apple launched a new TWO-step verification security process. Sounds good, but what does it mean? Basically, it’s a new security feature available for your Apple ID – by adding an additional step to your account authentication process, Apple can help keep you and your personal content safe.

 

» Read more


Category: Mobile Security, Tech News Comments

Smartphones Of The Future. What To Expect?

Posted by kdunlaevy@gmail.com

Smartphone of the future_blog1Remember that? – The brick phone. It was ginormous! And now look at what we’re all carrying around. We’ve pretty much all gotten rid of the flip phone, and now our phones are all screen, and touch screen at that! They’re already basically mini-computers in your pockets, so what on earth will they look like and do for us in the future?

 

» Read more


Category: Mobile Security, Tech News Comments

Internet Tax… What’s That?

Posted by kdunlaevy@gmail.com

Internet sales tax_blogIt’s no surprise really that it’s the United States leading this charge. They love their taxes, and now they’re trying to tax the internet. So, what does it mean to tax the internet and how might it affect you, should this pass through legislation and expand as the norm across the globe?

 

» Read more


Category: Tech News Comments

New Mobile Vulnerabilities Discovered

Posted by kdunlaevy@gmail.com

New mobile vulnerabilities_part_1_blogIf you are a cloud user, your smartphone is vulnerable than most. Yes, your mobile security is once again at risk – it just never stops! The crux of this latest mobile vulnerability: residual files remain on your smartphone even after the files have been uploaded to the cloud. So what does that mean? Hackers may be able to utilize these residual files to gain access to your cloud and the files saved within it.

 

» Read more


Category: Mobile Security, Tech News Comments

Previous Next




bottom roundness