How to Stop T-Mobile from Selling Your Web Browsing Data to Advertisers

 

The T-Mobile headquarters in Bellevue, Washington.
VDB Photos/Shutterstock.com

T-Mobile will begin sharing your web browsing and mobile app data with advertisers starting April 26, 2021. T-Mobile is automatically enabling this for nearly everyone, but you can opt-out to prevent T-Mobile from selling this data to marketers.

This also applies to other T-Mobile-owned carriers, including Sprint and Metro by T-Mobile.

Continue reading

6 Crypto Scams You Need to Know Before Buying Bitcoin

The cryptocurrency sector has grown at exponential rates over the past few years. The value of Bitcoin alone increased to over $50,000 in 2021 as more people poured cash into the markets. Unfortunately, the number of scams in the industry has also increased.

Continue reading

How to Find Hidden Cameras Using Your Mobile Phone

hidden-camera-detect

Have reason to be suspicious of a partner or employer? Feel that someone is watching you, perhaps with a hidden camera?

You could discover the truth if only you had some way of detecting the presence of a hidden camera. Fortunately, apps are available to help you find hidden surveillance cameras using just your smartphone.

Ready to find those secret cameras?

Continue reading

Inside This Amazon Scientist’s $25 Million Plan to Turn 12 Abandoned Acres in Jackson, Mississippi Into a Tech Hub | Inc.com

Nashlie Sephus’s latest venture isn’t just a moonshot. It’s a homecoming. Her goal: Create a tech hub out of 12 abandoned acres of vacant lots and derelict buildings in the heart of downtown Jackson, Mississippi.

The 35-year-old has spent the past four years splitting her time between Jackson, her hometown, and Atlanta, where she works as an applied science manager for Amazon’s artificial intelligence initiative. Amazon had acquired Partpic, the visual recognition technology startup where she was chief technology officer, in 2016 for an undisclosed sum. In 2018, she founded the Bean Path, an incubator and technology consulting nonprofit in Jackson that she says has helped more than 400 local businesses and individuals with their tech needs.

Continue reading

7 Android Apps That Act as a Remote Control for Your PC

With these Android apps, you can remotely control aspects of your PC like the keyboard, mouse, and media playback.

Have you ever been in a position where you didn’t want to get off the couch to pause a movie that’s playing on your Windows PC? The good news is that you don’t have to do that anymore, as long as you have your Android smartphone by your side.

There are several apps that let you control your PC from your phone like a remote. These apps act as the mouse and keyboard, allowing you to control your Windows PC from the comfort of your bed or elsewhere. Let’s take a look.

Continue reading

5 Ways an Offline PC Can Be Hacked

Shit is real in the online battlefield….

Some people believe taking a computer offline makes it impossible to hack. These offline PC attacks show it’s not as safe as you imagine.

Data breaches are rapidly becoming a part of everyday online life. Even a cursory glance at the news highlights the latest leak of confidential or personal information onto the internet. While many people are increasingly concerned by these developments, it can often seem as though you are powerless against them.

Continue reading

10 CHEAP THINGS EVERY ARTIST NEEDS | EP #238 feat Blueprint & Illogic

Great show with a lot of good info

As artists we often tell ourselves that the solution to our problems is money. And while money would definitely help us reach many of our goals faster, viewing things that way causes us to overlook the simple and cheap things that are right under our noses and can help us perform our jobs better. In this episode, Blueprint and Illogic break down 10 cheap things that every artist needs to have.

Continue reading

Ghost hack – criminals use deceased employee’s account to wreak havoc – Naked Security

 

Many, if not most, organisations will tell you that they have processes and procedures that they follow when employees leave.

In particular, most companies have a slick and quick procedure for removing ex-staff from the payroll.

Firstly, it doesn’t make economic sense to pay someone who is no longer entitled to the money; secondly, many countries require employers to withhold payroll taxes automatically, to pay those taxes in promptly, and to account for them accurately.

Why get into trouble with the tax office over former employees when you can have a simple “staff leaving” checklist that will help to keep you compliant and solvent at the same time?

Unfortunately, we’re not always quite so switched on (or, to be more precise, not quite so good at switching things off) when it comes to ex-staff and cybersecurity.

Continue reading