How “Likes” lead to malicious software.
Read more
“The biggest surveillance-based enterprise in the history of mankind.” In a hugely popular post titled The Ultimate Retaliation: Pranking my[…]
Read moreThey say they want your phone number to enhance your security. Then they sell it to advertisers. Two-factor authentication is[…]
Read moreAn illuminating post from Michael Alvear at Digital Book World: As an author, book marketer and social media specialist, I[…]
Read more