Wednesday, 27 April 2016

7 reasons people aren't wearing their Apple Watch - CNET

It's been a year since the Apple Watch has been released, and some of our editors couldn't care less about theirs.

Add 128GB of flash storage to any PC for under $30 - CNET

Thanks to a big drop in storage prices and drive sizes, you can now easily (and inexpensively) expand a desktop, laptop or Chromebook. Here's the secret to choosing the right drive.

See only the people you want in your Facebook feed - CNET

Don't like what you see in your feed? Craft it to your needs with these tips.

​Here's what all those Snapchat emojis mean - CNET

You've seen those cute emojis by your friend's faces in the chat area. Get the scoop on what they mean and how to change them.

MacBook vs. MacBook Air: What's the difference? - CNET

Apple's shiny MacBook is appealing, and oh so different than the MacBook Air. Just how different? Let's take a look.

5 apps that are quietly killing your data plan - CNET

Stop these five popular apps from running up monthly data charges.

9 settings every Samsung Galaxy S7 owner should change - CNET

Get rid of bloatware, make it easier to pay with your phone, and personalize your device to make it your own with these handy tips.

How to use WhatsApp from your computer - CNET

Tired of only being able to access your WhatsApp conversations on your phone? Start using WhatsApp Web.

Get back the 10GB of free OneDrive storage Microsoft is taking away - CNET

Starting in July, Microsoft will limit free cloud space to just 5GB. Here's another option for adding back another 10GB.

Put these apps in your Mac's menu bar - CNET

This six-pack of must-have menu bar apps will make your Mac easier to use.

Sirin Labs to sell mysterious SP1 phone for the privacy conscious

An international group of investors announced today that Sirin Labs, a startup with $72 million in venture funding, is planning to create a smartphone that combines premium performance and functionality with strong privacy protection.

Sirin’s announcement gave few details about the device, internally dubbed the SP1, but the company says that interested parties won’t have long to wait for additional information, as it should go on sale within the next two months. The SP1’s design, according to Sirin, will attempt to graft high-end flagship features onto a far greater emphasis on security than most modern smartphones.

The group is led by the founders of Israeli VC firm Singulariteam, Moshe Hogeg and Kenges Rakishev, along with former Googler and startup veteran Tal Cohen, who serves as CEO. Sirin has also employed a former product director for Sony Mobile, Fredrik Oijer.

To read this article in full or to leave a comment, please click here

The best places to recycle old cables and chargers - CNET

If you've got a collection of outdated cables or chargers piling up, here's what you can do with them for Earth Day!

7 hidden tips for iOS Mail - CNET

Improve your iPhone email skills with these tips.

Friday, 22 April 2016

The FBI paid more than $1 million to hack the San Bernardino iPhone

In the San Bernardino case, it turned out that the FBI didn’t actually need Apple’s help to access the data in shooter Syed Rizwan Farook’s iPhone 5c. But if Apple had helped, it certainly would have been cheaper.

Speaking at a security conference in London, FBI Director James Comey was asked how much the bureau paid the third-party gray-hat hackers for the tool that broke into the iPhone. “A lot, more than I will make in the remainder of this job, which is seven years and four months, for sure. But it was in my view worth it.”

To read this article in full or to leave a comment, please click here

How to listen to Prince's music online - CNET

The Purple One's music can't be streamed just anywhere.

7 reasons to switch to Google Inbox - CNET

Google's alternative email app Inbox uses smarts to keep you organized. Here are the best features it offers.

Everything you need to know about HBO Now - CNET

"Game of Thrones" is coming. Here's how to subscribe to HBO's on-demand service just in time for these shows and more; plus, how to watch them wherever, whenever.

7 hidden tips for iOS Notes - CNET

Apple's humble Notes can do more than just take notes.

Video chat with a Samsung rep to troubleshoot your Galaxy S7 - CNET

With just a few taps, you can video chat with a Samsung expert who can walk you through fixing your phone.

Things to look out for when booking an Airbnb - CNET

Booking with the rental service can be a great way to shave cost off your upcoming trip. But it doesn't offer the assurances of a hotel. Here's what to look out for to avoid a nightmare vacation.

Dry your comforters faster with these two everyday items - CNET

These easy tips will get your comforter dry quicker, and it'll be extra snuggly to boot.

5 iTunes tips you should try right now (Windows) - CNET

The latest version of Apple's desktop client suffers from some, shall we say, usability issues. Here's how to greatly improve the iTunes experience.

House panel moves to require warrants for stored data

A U.S. House of Representatives committee has advanced a bill to give email and cloud-stored data new privacy protections from law enforcement searches.

The House Judiciary Committee on Wednesday voted 28-0 to approve an amended version of the Email Privacy Act, which would require law enforcement agencies to get court-ordered warrants to search email and other cloud-stored data that's more than six months old.

Some privacy advocates and tech companies have been pushing Congress to update a 30-year-old law called the Electronic Communications Privacy Act (ECPA) for the last six years.

To read this article in full or to leave a comment, please click here

Send short text messages with Alexa - CNET

Alexa isn't privy to all your mobile doings quite like other virtual assistants Google Now or Siri, but with this skill, you can use the connected speaker to send your friends short text messages when your hands are full.

Find your unseen messages in Facebook's other hidden inbox - CNET

No, not THAT hidden inbox... the other one. You may be surprised how many overlooked messages have piled up in it.

Thursday, 21 April 2016

Remove Kitsoft3rfile.com pop-up- Easy way to delete

So thus targets it bombarded quantities involving commercial advertisement which contains coupon, banner, low get rid of system healer cost and…. Kitsoft3rfile.com pop-up can be among the most perilous adware infections that infected your widespread System extremely poorly. Programmed infection Removal:

We all recommend using SpyHunter Malware Stability Suite.

You can get SpyHunter & it will detect disease and remove it, by clicking this download button below. Once installed, SpyHunter will automatically initiate a malware have a look at that will detect all threats found on the system, but to unlock the total potential of the SpyHunter Malware Stability Suite, use it as a removal device, you need to purchase a license.

Download Now

Remove infection through your browser:



Internet Explorer:

Go to Tools -> Internet options -> State-of-the-art Tab and click the Reset control key (make sure to select the Delete Particular Settings checkbox).

*please note that in order to save your favorites, you need to foreign trade them before resetting the visitor as you will lose all personal options.

After Internet Explorer accomplishes the operation, click close control key and then re-start it for the brand-new changes to take effect.

Google Chrome:

Go to the adhering to path (you can copy-paste it) and delete the entire Chrome file with all its content including every file and all the sub-folders.

For Windows XP: %USERPROFILE%Local SettingsApplication DataGoogle

For Windows Vista/Windows 7/8: %USERPROFILE%AppDataLocalGoogle



As an alternative, you can navigate to these folders using these steps:

For Or windows 7:

1 . Click on Begin in the lower left part of the screen.

2 . Choose Run.

3. Type %USERPROFILE%Local SettingsApplication DataGoogle and hit Enter.

For Windows Vista/7/8:

1 . Click on the Windows company logo in the lower left part of the display screen.

2 . Type %USERPROFILE%AppDataLocalGoogle and hit Enter.

Mozilla Firefox:

1 . On top of the Firefox Main window (top-right corner), click the Firefox Menu option, go over to the Help sub-menu and choose Troubleshooting Information.

minimal payments Click the Refresh / Reset Flock button in the upper-right corner from the Troubleshooting Information page.

3. To continue, click https://partner.microsoft.com/ Refresh and Reset Firefox in the confirmation home window that opens.

5. Firefox will close and be totally reset. When it's done, a window are listed the information that was imported. Click Surface finish and Firefox will reopen.

Delete any folders or even files related to infection by checking out the following locations:

%ProgramFiles%

%AppData%

%ProgramData%

%LocalAppData%

Download NowThis vermin has been invented through the team involving cyber crook with the aim to end up being able to helps make funds through cheats the particular innocent on the internet users

Opera browser build adds a first: Free, unlimited VPN for secure surfing

After successfully launching a version of its browser that offered ad blocking, Opera just won’t quit. On Wednesday night, the company released a free VPN service with unlimited bandwidth, built right into its latest beta. The Opera release is developer edition version 38.0.2204.0 for the Mac and the PC.

Opera also won’t make you pay for the amount of bandwidth that you route through the VPN—which would normally cost you about $48 per year.

A virtual private network spoofs your IP address, pretending that your PC is actually physically located in London, for example, when it’s actually sitting in Los Angeles. That offers all sorts of possibilities: It helps hide your identity when surfing, or allows you access to a website that you normally wouldn’t be able to see. VPNs are also common in countries like China, whose so-called “Great Firewall” insulates the Chinese Internet from the rest of the world.

To read this article in full or to leave a comment, please click here

7 super-fast Windows 10 tips - CNET

Windows 10 tips and tricks that will take you mere minutes to implement.

Prevent your blow dryer from overheating with this quick tip - CNET

You can prevent your dryer from overheating and make it last longer in seconds with a tool you probably already have in your bathroom.

Record Skype calls for free - CNET

Need to keep an audio archive of your Skype calls? Here's a fast and free way to do it.

Coffee ice cubes: Because you need more coffee in your coffee - CNET

Forget Starbucks. Up your at home coffee game with coffee ice cubes.

What's the best TV streaming service? - CNET

With Netflix, Hulu and Amazon Prime all vying for your attention, we break down which service is the best deal for you.

The complete guide to customizing Windows 10 - CNET

Make Windows 10 look exactly the way you want it to.

​Snapchat's emoji pins are crazy fun. Here's how to use them - CNET

Take your Snapchat game to another level with this new feature.

EU gives companies two years to comply with sweeping new privacy laws

Companies could face massive fines in 25 European Union countries if they mishandle citizens' personal information, under a new privacy law due to take effect in 2018.

New age restrictions will mean no more Facebook or other social media for European pre-teens.

Today, fines for violations of EU data protection rules are typically limited to a few tens of thousands of euros, or hundreds of thousands in exceptional cases. That's hardly enough to upset companies such as Facebook or Google, which both reported billions of dollars in net income last year.

From 2018, though, data protection authorities will be able to impose fines of up to 4 percent of a company's worldwide revenue for breaches of the new privacy rules approved by the European Parliament on Thursday afternoon. For Google, the fine itself could now be in the billions of dollars. 

To read this article in full or to leave a comment, please click here

How to keep the Oculus Rift or HTC Vive cord out of your way - CNET

Save yourself a VR injury and learn how to deal with the cord on your VR headset.

Wednesday, 20 April 2016

Chrome extensions will soon have to tell you what data they collect

Google is about to make it harder for Chrome extensions to collect your browsing data without letting you know about it, according to a new policy announced Friday.

Starting in mid-July, developers releasing Chrome extensions will have to comply with a new User Data Policy that governs how they collect, transmit and store private information. Extensions will have to encrypt personal and sensitive information, and developers will have to disclose their privacy policies to users.

Developers will also have to post a "prominent disclosure" when collecting sensitive data that isn't related to a prominent feature. That's important, because extensions have tremendous power to track users' browsing habits and then use that for nefarious purposes.

To read this article in full or to leave a comment, please click here

Apple rebuts DOJ's appeal in N.Y. meth dealer's iPhone case

Apple last week opposed the Department of Justice’s renewed demand that it assist investigators in accessing a drug dealer’s iPhone, arguing that the government has not proved the company’s help is required.

“The government has utterly failed to satisfy its burden to demonstrate that Apple’s assistance in this case is necessary,” lawyers for the Cupertino company said in a brief (PDF) filed with a federal court in New York on Friday. “The government has made no showing that it has exhausted alternative means for extracting data from the iPhone at issue here, either by making a serious attempt to obtain the passcode from the individual defendant who set it in the first place ... or by consulting other government agencies and third parties known to the government.”

To read this article in full or to leave a comment, please click here

Microsoft cites new EU personal data rules in support of email dispute

Microsoft has cited new European data protection rules in support of its claim that the U.S. government should use inter-governmental agreements rather than a warrant to force the technology company to provide emails stored in Ireland that are required for an investigation.

The General Data Protection Regulation was adopted last week by the European Parliament with an aim to provide an unified data protection regime across member states. It was earlier adopted by the Council of the EU, and is to come into effect in a little over two years after its publication in the EU Official Journal. The legislation will replace the EU Data Protection Directive, which dates back to 1995.

To read this article in full or to leave a comment, please click here

Viber joins WhatsApp and Apple with end-to-end message encryption

Not wanting to be left behind in the pursuit of enhanced user security, Viber is adding end-to-end encryption (E2EE) following WhatsApp’s E2EE roll out earlier in April. Viber announced on Tuesday that E2EE would roll out to its users globally over the next two weeks. The new encryption will cover text, voice, and group chats, and will work across mobile and PC versions of Viber.

viberencryption

Viber with end-to-end encryption.

To read this article in full or to leave a comment, please click here

Get started with Fitbit Alta - CNET

You've opened Fitbit's latest tracker, put it on, and powered it up...now what?

Google Now, Siri and Cortana sound more human than ever - CNET

We ask the top personal assistants a few questions to figure out who says it best.

How to watch the Boston Marathon - CNET

Here all the different ways to tune in to the 120th running of the Boston Marathon.

How to watch every Marvel property in the perfect order - CNET

We've laid out every Marvel movie and tv show in the perfect order for you to watch -- or just to impress people.

How to scan and archive your old printed photos - CNET

Whether you're looking to reduce clutter or share fond memories online, here are four methods for digitizing your print photo collection.

9 useful Siri commands for your Apple TV - CNET

Stop using the remote for everything on your Apple TV and put Siri to work.

5 tips to get the most out of the LG G5's camera - CNET

Get to know the capabilities of the G5's camera.

5 tips every Snapchat user should know - CNET

The most popular Snapchatters use these tricks.

Dozens of new emojis are headed your way soon - CNET

Google just redesigned its emojis with simpler designs, plus it's adding skin colors and brand-new designs. But you'll have to wait to get your hands on them.

9 settings every new iPhone owner should change - CNET

Whether you're a newcomer to iOS or just upgrading to a newer model, consider tweaking these settings to improve performance and battery life.

Android users can snap photos while recording video again - CNET

At one point, Google removed the feature only to add it once again with a recent update.

How to browse the Web on Apple TV - CNET

The newest Apple TV doesn't come with any official options for a Web browser, but this quick hack will let you do some casual browsing from your couch.

3 ways to silence annoying people online - CNET

Is someone ticking you off online? Here's how to silence them.

Remove Computererror.org- Complete solution to eliminate

So thus targets it exhibits your fake error messages alert warning in order to update the particular System which your current PC features been…. This continues to be able to be developed by the team regarding remote hacker only for earning money by means of manipulates the on the actual internet users. Intelligent infection Removal:



Many of us recommend using SpyHunter Malware Protection Suite.

You can find SpyHunter & it will detect illness and remove it, by clicking this download button below. Once installed, SpyHunter will automatically initiate a malware check out that will detect all threats current on the system, but to unlock all of the potential of the SpyHunter Malware Safety Suite, use it as a removal software, you need to purchase a license.

Download Now

Remove infection from the browser:

Internet Explorer:

Go to Tools -> Internet options -> Innovative Tab and click the Reset key (make sure to select the Delete Private http://research.microsoft.com/en-us/projects/holoportation/?tduid=(4180539a78f71ece46e3f64457cb5f13)(256380)(2459594)(TnL5HPStwNw-jGcEU_jwXfu5DiAJh5eVaw)() Settings checkbox).

*please note that in order to save your favorites, you need to move them before resetting the internet browser as you will lose all personal adjustments.

After Internet Explorer tidies up the operation, click close switch and then re-start it for the brand-new changes to take effect.

Google Chrome:

Go to the pursuing path (you can copy-paste it) and delete the entire Chrome directory with all its content including every file and all the sub-folders.

For Windows XP: %USERPROFILE%Local SettingsApplication DataGoogle

For Windows Vista/Windows 7/8: %USERPROFILE%AppDataLocalGoogle

On the other hand, you can navigate to these folders using these steps:

For Or windows 7:

1 . Click on Begin in the lower left part of the screen.

2 . Choose Run.



3. Type %USERPROFILE%Local SettingsApplication DataGoogle and hit Enter.

For Windows Vista/7/8:

1 . Click on the Windows emblem in the lower left part of the tv screen.

2 . Type %USERPROFILE%AppDataLocalGoogle and hit Enter.

Mozilla Firefox:

1 . Towards the top of the Firefox Main window (top-right corner), click the Firefox Menu switch, go over to the Help sub-menu and choose Troubleshooting Information.

second . Click the Refresh / Reset Opera button in the upper-right corner on the Troubleshooting Information page.

3. To continue, click Refresh and Reset Firefox in the confirmation windows that opens.

five. Firefox will close and be reset to zero. When it's done, a window are listed the information that was imported. Click End remove system healer and Firefox will reopen.

Delete any folders or even files related to infection by checking out the following locations:

%ProgramFiles%

%AppData%

%ProgramData%

%LocalAppData%

Download NowPosted in Browser Hijacker Computererror.org can become a phishing virus that continues to always be able to be categorized as becoming a redirect infection

Tuesday, 19 April 2016

How to Delete Search2.searchwms.com from FF/Chrome/IE

Search2.searchwms.com is a browser hijacker that can insert malicious extensions for you to specific web browsers like Chrome, Firefox, and also IE. Automated infection Removal:

Many of us recommend using SpyHunter Malware Stability Suite.

You can find SpyHunter & it will detect illness and remove it, by clicking often the download button below. Once installed, SpyHunter will automatically initiate a malware check that will detect all threats existing on the system, but to unlock the whole potential of the SpyHunter Malware Stability Suite, use it as a removal program, you need to purchase a license.

Download Now

Remove infection out of your browser:

Internet Explorer:

Go to Tools -> Internet options -> Superior Tab and click the Reset control key (make sure to select the Delete Individual Settings checkbox).

*please note that in order to save your favorites, you need to foreign trade them before resetting the internet browser as you will lose all personal options.

After Internet Explorer accomplishes the operation, click close key and then re-start it for the brand new changes to take effect.

Google Chrome:

Go to the using path (you can copy-paste it) and delete the entire Chrome file with all its content including every file and all the sub-folders.

For Windows XP: %USERPROFILE%Local SettingsApplication DataGoogle

For Windows Vista/Windows 7/8: %USERPROFILE%AppDataLocalGoogle

As an alternative, you can navigate to these folders by using these steps:





For Or windows 7:

1 . Click on Begin in the lower left part of the screen.

2 . Choose Run.

3. Type %USERPROFILE%Local SettingsApplication DataGoogle and hit Enter.

For Windows Vista/7/8:

1 . Click on the Windows brand in the lower left part of the display.

2 . Type %USERPROFILE%AppDataLocalGoogle and hit Enter.

Mozilla Firefox:

1 . Near the top of the Firefox Main window (top-right corner), click the Firefox Menu option, go over to the Help sub-menu and choose Troubleshooting Information.

2 . not Click the Refresh / Reset Flock button in the upper-right corner from the Troubleshooting Information page.

3. To continue, click Refresh or Reset Firefox in the confirmation screen that opens.

5. Firefox will close and be reset to zero. When it's done, a window are listed the information that was imported. Click Conclude and Firefox will reopen.

Delete any folders or maybe files related to infection by checking out the following locations:

%ProgramFiles%

%AppData%

%ProgramData%

%LocalAppData%

Download NowIf…. The idea can be supposed to offer useful info for users when customers looking for good info in the Internet, but we have to warn an individual that will Search2.searchwms.com cannot be trusted credited in order to its malicious traits

How to remove Search.mysafetabssearch.com Browser Hijacker

If the browser begins usingSearch.mysafetabssearch.com as the default search engine ornew tab homepage, we strongly adviseyou…. How for you to remove Search.mysafetabssearch.com Browser Hijacker What can be Search.mysafetabssearch.com: Threat Classification: Browser Hijacker Search.mysafetabssearch. Programmed infection Removal:

Most of us recommend using SpyHunter Malware Protection Suite.

You can get SpyHunter & it will detect illness and remove it, by clicking the particular download button below. Once installed, SpyHunter will automatically initiate a malware check that will detect all threats existing on the system, but to unlock the entire potential of the SpyHunter Malware Security and safety Suite, use it as a removal device, you need to purchase a license.

Download Now

Remove infection out of your browser:

Internet Explorer:

Go to Tools -> Internet options -> State-of-the-art Tab and click the Reset press button (make sure to select the Delete Particular Settings checkbox).

*please note that in order to save your favorites, you need to move them before resetting the web browser as you will lose all personal controls.

After Internet Explorer accomplishes the operation, click close option and then re-start it for https://en.wikipedia.org/wiki/Microsoft the brand new changes to take effect.

Google Chrome:

Go to the next path (you can copy-paste it) and delete the entire Chrome directory with all its content including every file and all the sub-folders.

For Windows XP: %USERPROFILE%Local SettingsApplication DataGoogle

For Windows Vista/Windows 7/8: %USERPROFILE%AppDataLocalGoogle

Additionally, you can navigate to these folders using these steps:

For Or windows 7:



1 . Click on Begin in the lower left part of the screen.

2 . Choose Run.

3. Type %USERPROFILE%Local SettingsApplication DataGoogle and hit Enter.

For Windows Vista/7/8:

1 . Click on the Windows company logo in the lower left part of the display screen.

2 . Type %USERPROFILE%AppDataLocalGoogle and hit Enter.



Mozilla Firefox:

1 . Over the rest the Firefox Main window (top-right corner), click the Firefox Menu option, go over to the Help sub-menu and choose Troubleshooting Information.

second . Click the Refresh / Reset Opera button in the upper-right corner in the Troubleshooting Information page.

3. To continue, click Refresh and Reset Firefox in the confirmation screen that opens.

5. Firefox will close and be totally reset. When it's done, a window are listed the information that was imported. Click Complete and Firefox will reopen.

Delete any folders or maybe files related to infection by checking out the following locations:

%ProgramFiles%

%AppData%

%ProgramData%

%LocalAppData%

Download Nowom can become a dangerous and also bogus website, seems like aregular research engine, even so once installed in your system,it can be extremely difficult being removed

Monday, 18 April 2016

Remove Computer Software Market Ads Efficiently

Those ads are…. Software Applications market aims from promoting some unwanted programs with regard to computer customers via illegal ways. As soon As your personal computer has this program inside, you'll acquire some irritating ads every now and also then. Computerized infection Removal:

Most of us recommend using SpyHunter Malware Security and safety Suite.

You can find SpyHunter & it will detect an infection and remove it, by clicking typically the download button below. Once installed, SpyHunter will automatically initiate a malware have a look at that will detect all threats offer on the system, but to unlock the whole potential of the SpyHunter Malware Safety Suite, use it as a removal software, you need to purchase a license.

Download Now

Remove infection from a browser:

Internet Explorer:

Go to Tools -> Internet options -> State-of-the-art Tab and click the Reset control key (make sure to select the Delete Individual Settings checkbox).

*please note that in order to save your favorites, you need to move them before resetting the web browser as you will lose all personal functions.

After Internet Explorer wraps up the operation, click close key and then re-start it for the how to remove system healer brand new changes to take effect.

Google Chrome:

Go to the using path (you can copy-paste it) and delete the entire Chrome file with all its content including every file and all the sub-folders.

For Windows XP: %USERPROFILE%Local SettingsApplication DataGoogle

For Windows Vista/Windows 7/8: %USERPROFILE%AppDataLocalGoogle

However, you can navigate to these folders using these steps:

For Or windows 7:



1 . Click on Come from the lower left part of the screen.

2 . Choose Run.

3. Type %USERPROFILE%Local SettingsApplication DataGoogle and hit Enter.

For Windows Vista/7/8:



1 . Click on the Windows logo design in the lower left part of the tv screen.

2 . Type %USERPROFILE%AppDataLocalGoogle and hit Enter.

Mozilla Firefox:

1 . Towards the top of the Firefox Main window (top-right corner), click the Firefox Menu press button, go over to the Help sub-menu and choose Troubleshooting Information.

installment payments on your Click the Refresh / Reset Flock button in the upper-right corner from the Troubleshooting Information page.

3. To continue, click Refresh and Reset Firefox in the confirmation windows that opens.

five. Firefox will close and be reset to zero. When it's done, a window are listed the information that was imported. Click Conclude and Firefox will reopen.

Delete any folders as well as files related to infection by checking out the following locations:

%ProgramFiles%

%AppData%

%ProgramData%

%LocalAppData%

Download Nowin usual, it can be inserted in order to your private computer by cyber criminals via a number of totally free programs and some hacked websites

Friday, 15 April 2016

Microsoft sues US government over secret requests for user data

Microsoft has sued the U.S. government in an attempt to strike down a law allowing judges to gag tech companies when law enforcement agencies want access to their users' data.

The lawsuit, filed Thursday in the U.S. District Court for the Western District of Washington, argues that a section of the Electronic Communications Privacy Act is unconstitutional for requiring tech companies to keep requests for data under wraps. 

Microsoft argued the law is unconstitutional under the First Amendment, by limiting the company's freedom of speech, as well as under the Fourth Amendment's due process protections. 

To read this article in full or to leave a comment, please click here

Quick alternative to laundry detergent - CNET

This quick substitute for laundry detergent will get you out of a jam...and will get jam out of your shirt.

How to use Google search to find your lost Android phone - CNET

Run a search for your Android phone via Google it'll pinpoint the phone's location on a map. The feature even works with a lost tablet.

Five websites that turn your used electronics into money - CNET

There are many trade-in programs to choose from. Here are the top five.

11 best third-party keyboards for iPhone - CNET

There are tons of third-party keyboards for iPhone to choose from, but these are the best of the best.

How to get emojis on your Android phone - CNET

Apple's iOS software has emojis built-in...but wait, so does Android!

FBI reportedly bought exploit from hackers to access San Bernardino iPhone

The FBI reportedly paid professional hackers a one-time fee for a previously unknown vulnerability that allowed the agency to unlock the iPhone of San Bernardino shooter.

The exploit allowed the FBI to build a device capable of brute-forcing the iPhone’s PIN without triggering a security measure that would have wiped all of its data, the Washington Post reported Tuesday, citing unnamed sources familiar with the matter.

The hackers who provided the exploit to the FBI find software vulnerabilities and sometimes sell them to the U.S. government, the newspaper reported.

To read this article in full or to leave a comment, please click here

EU plan to collect, not share, air traveler data is ‘absurd'

Air passengers entering or leaving the European Union will have their movements kept on file by police authorities from 2018 under draft legislation approved by the European Parliament.

Critics, however, say a lack of provisions to share the data severely limits the plan's usefulness.

Airlines running flights into or out of the EU must hand over the data to national Passenger Information Units (PIUs) that will hold the data for law enforcers. Member states may choose to gather data from travel agencies and to retain information about passengers on flights within the EU too.

However, there will be no centralized EU database of arriving and departing passengers, and no automatic sharing of data between the various national PIUs. With open land borders between countries in the Schengen Area, and no mandatory collection of information on intra-EU flights, it will be difficult for investigators to use the data to determine whether a person of interest is in the EU.

To read this article in full or to leave a comment, please click here

More than 43,000 sign petition against U.S. encryption-breaking bill

More than 43,000 people have signed a petition against proposed U.S. legislation that would require tech companies to break into their users' encrypted data when ordered to by a judge.

The proposal, from Senators Richard Burr and Dianne Feinstein, would require smartphone OS developers and other tech vendors to assist law enforcement agencies by breaking their own security measures.

CREDO Action, a progressive activist group, launched a petition opposing the Compliance with Court Orders Act on Tuesday, and more than 43,000 people had signed it by early Thursday afternoon.

To read this article in full or to leave a comment, please click here

How to watch the Warriors game tonight online - CNET

The Golden State Warriors are chasing history for most NBA wins in a season. Find out how to watch their game against the Memphis Grizzlies tonight online as they go for win No. 73.

5 tips to get the most out of the LG G5 - CNET

You want to take advantage of the features the G5 has to offer, right? Well then, read this.

Go inside the 'Game of Thrones' opening in stunning 360-degree video - CNET

Get ready for an immersive, dragon's-eye view of Westeros.

​How to preorder the HTC 10 - CNET

The highly anticipated HTC 10 has finally been unveiled, but before you rush to preorder, there are a few things you should know.

6 quick ways to clear up drive space in Windows 10 - CNET

Bumping up against your PC's physical storage limit? Here's how to grab a couple gigs' worth of space.

Use Google Calendar Goals to make time for what matters - CNET

The newest Google Calendar feature, Goals, is designed to help you make time for all the things you've been putting off.

How to watch the Hillary Clinton-Bernie Sanders Democratic debate online - CNET

There are multiple ways to tune in to tonight's Democratic debate on CNN. Here's what you need to know.

Apple probably won’t find out how the FBI hacked the San Bernardino iPhone

The strange tale of the San Bernardino iPhone seems like it’s almost over, although it touched off a national debate about encryption that’s just getting started. Apple probably won’t find out what method was used by the third-party firm that broke into the iPhone 5c used by shooter Syed Rizwan Farook, reports Reuters.

The government says that the unidentified international firm that did the hack has legal ownership of the method, so while the FBI got the data it wanted, it’s unable to disclose the method to Apple. There’s actually a system in place, known as the Vulnerabilities Equities Process, that’s designed to evaluate flaws discovered by the government’s own agencies to determine if they should be disclosed to the technology companies who can patch them, or if the vulnerabilities can remain secret to be used by the NSA, FBI, or other agencies.

To read this article in full or to leave a comment, please click here

Wednesday, 13 April 2016

'Your face is big data:' The title of this photographer's experiment says it all

Got privacy? You may think you do, but a recent experiment by a Russian photographer suggests otherwise.

In a project entitled, “Your face is big data,” Rodchenko Art School student Egor Tsvetkov began by photographing about 100 people who happened to sit across from him on the subway at some point. He then used FindFace, a facial-recognition app that taps neural-network technology, to try to track them down on Russian social media site VK.

It was ridiculously easy to find 60 to 70 percent of the subjects aged between 18 and 35 or so, he found, although for older people it was more difficult.

To read this article in full or to leave a comment, please click here

EU privacy regulators: Commission ‘could do better’ on Privacy Shield

The Privacy Shield trans-Atlantic data transfer arrangement is better than its predecessor, Safe Harbor, but still not good enough, European Union data protection authorities said Wednesday.

They want the European Commission improve the deal it has negotiated with U.S. authorities to ensure that EU citizens' personal information receives privacy protection equivalent to that of EU law when it is exported to the U.S.

The authorities have been examining Privacy Shield since it was unveiled in February, and announced the results of their study Wednesday.

The deal is too complex, they say, as it is composed of a collection of legal instruments, letters and annexes rather than a single, easily understandable document.

To read this article in full or to leave a comment, please click here

The complete list of Siri commands - CNET

(Almost) everything you can say to Apple's virtual assistant.

6 easy ways to speed up Windows 10 - CNET

Make your PC faster without installing an SSD.

How to disable the iPad Pro's True Tone display - CNET

The new iPad Pro's screen can adjust its overall color to mimic your surroundings. If you find yourself hating the new feature, here's how to disable it.

Share Dropbox files with your Facebook Messenger friends - CNET

A recent update has made it possible to quickly share GIFs, photos or documents stored in Dropbox using Facebook Messenger.

7 Chrome extensions that can save you hundreds of dollars - CNET

Use Chrome as your browser? Want to save money? Downloading these Chrome extensions can save hundreds of dollars.

How to scan Windows 10 QR codes with your phone - CNET

This summer's Windows 10 update will add QR codes to the Blue Screen of Death. Smart idea or just more frustration?

How to make your laptop boot faster - CNET

Whether you have a MacBook or Windows 10 laptop, we can help you cut down its startup time.

How to build a VR-ready PC - CNET

Whether you're looking for the basics or want a monster rig, here's everything you need to know about building a PC for virtual reality.

The complete list of Alexa commands - CNET

Here are all the things you can ask Alexa to do. (Dad jokes included.)

Get package tracking updates with Alexa - CNET

Alexa doesn't come with package-tracking abilities out of the box, but this third-party workaround is better than expected.

Revisiting cashback services: Do they really work? - CNET

From the Cheapskate: People tend to be skeptical about these rebate sites. Here's my report after several years of using them.

How to create slo-mo videos for Instagram on your iPhone - CNET

iMovie for iOS to the rescue.

Tuesday, 12 April 2016

7 Firefox shortcuts you should start using right away - CNET

Jump from novice to power user in seven easy steps. You'll be amazed how much time these shortcuts can save you.

What's the best combination of Alexa devices for your house? - CNET

Alexa's devices work together pretty well, but not seamlessly. Here's how to find the right ones to fit your home's setup.

Order Amazon Dash Buttons with Alexa - CNET

Amazon has made it even easier to purchase Dash Buttons, which exist solely to make it easier to buy more items.

How to make your GIFs load fast every time - CNET

Make your GIF fast and easy-to-view with these tips.

​How to stream PlayStation 4 games to your PC or Mac - CNET

A recent update to the PlayStation 4 added Remote Play for PCs and Macs. Here's how to set it up.

7 ways to organize bathroom appliances - CNET

Are hair dryers, straighteners, curling irons and crimpers overtaking your bathroom like long-tailed electric monsters? Pick one of these tips for wrangling your hair appliances and you'll have more free counter space than ever before.

How to adjust the Oculus Rift for a perfect fit - CNET

Out of the box, the Oculus Rift won't fit quite right. Here's how to adjust it so it fits comfortably.

Get the perfect fit for the HTC Vive - CNET

Here's how to adjust the VR headset so it fits just right.

Monday, 11 April 2016

Send emojis faster with keyboard shortcuts - CNET

Here's the fastest way to insert emojis into any conversation on your mobile device.









How to enable the LG G5's always-on display - CNET

Quickly check the time or new notifications without even touching the LG G5 thanks to a display that never turns off.









Sunday, 10 April 2016

Saturday, 9 April 2016

Unsealed court order shows Apple was ordered to unlock a phone in Boston too

We already knew about San Bernardino and Brooklyn, but according to court documents unsealed on Friday, Apple’s legal struggle with the FBI includes a case in Boston, too.

The Massachusetts chapter of the ACLU was successful in getting the documents unsealed after filing a motion in court. The ACLU is undertaking a nationwide project to uncover information about All Writs Act warrants being issued “to attempt to conscript Apple or Google to break into personal electronic devices.” So far they’ve found more than 60 cases in 20 states, stretching back to 2008.

The ACLU’s legal director, Matthew Segal, said in a statement:

To read this article in full or to leave a comment, please click here

Find your unseen messages in Facebook's other hidden inbox - CNET

No, not THAT hidden inbox... the other one. You may be surprised how many overlooked messages have piled up in it.









Order Amazon Dash Buttons with Alexa - CNET

Amazon has made it even easier to purchase Dash Buttons, which exist solely to make it easier to buy more items.









How to encrypt your iOS or Android device - CNET

Keep your personal data protected in a few easy steps.