As people scramble to find those last-minute gifts for their loved ones, cyber criminals are likely to attempt some sophisticated, wide-reaching scams in an attempt to part desperate shoppers from their money.
We have recently (within the last couple of hours) been alerted to a set of instructions that appear to be circulating on parts of the Internet telling people how to supposedly enable 'Developer Mode' OS X.
In this first of a series of posts about re-claiming your private data from 'the cloud' I will explore how you can achieve all the functionality of services like Dropbox, while ensuring you know exactly where your data is.
On October 3rd 2013 Adobe (the world's largest supplier of software and services for the design and media industries) discovered unauthorised access had been made to their systems, leading to the compromise of some 2.9 million user accounts (including encrypted credit/debit card details) and the source code for their web application server - Cold Fusion. Update […]
Apple announced an interesting feature they are adding to the latest version of OS X and iOS at their World Wide Developer Conference this year: iCloud Keychain. Now that iOS 7 is out, I thought I would give you my opinion as to why you should probably not use it. Edit (19/09/2013 13:01): iCloud Keychain is […]
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.