
Source: Apple drops discoveryd in latest OS X beta following months of network issues | 9to5Mac
Google Photos Reminder: Smile, It’s Free — You’re The Product! | TechCrunch
There’s no doubt Google Photos is a massive landgrab for personal data — at a time when visual imagery is the biggest social currency of the web.
Source: Google Photos Reminder: Smile, It’s Free — You’re The Product! | TechCrunch
TechYou joined a botnet if you use this VPN service – Fortune
A spam attack shed light on this virtual private network’s shady business practices.
Source: TechYou joined a botnet if you use this VPN service – Fortune
How Rock Iconoclasts Devo Became Leaders Of The 1980s Nerd Nirvana | Fast Company | Business + Innovation
Unicode of Death got you down? Here’s how to fix it | Cult of Mac
If you’re unwittingly participating in the return of the Unicode of Death, here are some things to try.
Source: Unicode of Death got you down? Here’s how to fix it | Cult of Mac
What Happens to Your Data When You Monitor Your Personal Fitness | Robin Raskin
Wearing a fitness bracelet from FitBit, Jawbone, Microsoft, Withings, and others has become increasingly common. About one in ten people in the US now do some sort of fitness monitoring.
Source: What Happens to Your Data When You Monitor Your Personal Fitness | Robin Raskin
Hackers have been using the Starbucks app to steal money from latte drinkers – Quartz
Thieves steal tax data for 100,000 from an IRS website
You might need to keep a closer eye than usual on your tax-related info. The Internal Revenue Service is warning that intruders stole tax data for 100,00
Source: Thieves steal tax data for 100,000 from an IRS website
NSA Planned to Hijack Google App Store to Hack Smartphones – The Intercept
The NSA and its partners developed a top-secret method to infect smartphones with spyware through Google and Samsung app servers, Snowden documents reveal.
Source: NSA Planned to Hijack Google App Store to Hack Smartphones – The Intercept
GPU-based rootkit and keylogger offer superior stealth and computing power | Ars Technica
Proof-of-concept malware may pave the way for future in-the-wild attacks.
Source: GPU-based rootkit and keylogger offer superior stealth and computing power | Ars Technica













