Technology & Social Media

Home Topics Technology & Social Media

Protecting Your Privacy at the US Border

What are your rights at the border? It depends on your immigration status, and even US citizens will not enjoy their usual Constitutional rights...

Masking Your Digital Footprints

WikiLeaks dumped almost 9000 pages of secret CIA documents on the web for all to see, detailing dozens of secret hacking tools and techniques....

How The Bad Guys Trick You Into Taking Their Bait

“Phishing” is one of the most common and most effective ways for the bad guys to get your passwords or credit card information. In...

Why CloudBleed Wasn’t So Bloody Scary

The media was once again telling everyone to light their hair on fire over the latest web bug that threatens to expose all of...

The Internet of Things is The Next Big Security Nightmare

The Internet of Things involves the increasing advances of objects and entities provided with the ability to automatically transfer data over a network. The “Internet...

Does Biometric Scanning Really Keep Your Personal Information Safe?

It requires more than just a key or a password -- you need to use a physical attribute to now get inside some airports,...

Shaping The New Narrative, Big Brother & Big Media – Sharyl Attkisson

The new narrative today involves; as Sharyl Attkisson puts it 'Shady Political Operatives' - who have essentially taken possession of the minds, bodies and emotions of an entire...

Yahoo Hacked Again! Free Email Services Becoming Costly to Consumers

More than ONE BILLION Yahoo accounts have been exposed after a third-party hacker hit the internet company in a separate attack from the one that was...

Own an Android? Chances Are You’ve Been Hacked!

Android 'Gooligan' Hackers Scored The Biggest Ever Theft Of Google Account by hacking into 1 million Google accounts hitting them with malware that can access...

RULE 41 and the Destruction of Your 4th Amendments Rights

Dec 1st was when your 4th Amendment was destroyed. “We’re in the midst right now of one of the biggest battles in the privacy world...

An Inside Look at Spamming from a Former Spammer

Spam has become an integral part of Internet life. Once your e-mail address gets on a spam list, it's close to impossible to remove it....

Identity Theft Protection Is a Theft

Millions of people subscribe to credit monitoring or Identity theft protection services each year. This is due in part to the million + of...

Clinton Email Hack… Could It Happen To You?

In a recent twist, scam artists are using the phone to try to break into your computer. They call, claiming to be computer techs...

Bait and Phish, Computer Hacks Target People Just Like You!

Many scams happen online and are set up by computer hackers. The hackers send fake emails and/or set up bogus websites, which may look...

Google’s Psych-War On Police No Laughing Matter

Those who don’t believe that there is an active War on Police are naïve. This war impacts law enforcement officers on many fronts including...

American Tech Companies Continue To Sell Consumers Out

Without the cooperation of American tech companies — both voluntary and compelled — the National Security Agency’s system of mass surveillance is simply not...

Sociopathic Corporations Operate Like The Mafia

This past Monday I watched some dramatic live coverage from Mandan, North Dakota on Democracy Now’s website. The coverage showed the celebration of the official...

The GMAIL Quandary & what to do about it!

I met a man recently who uses cash, no credit cards, and he has no email account - and I thought what a fool!...

Screen Addiction An Epidemic

So here we go—another dire warning of the addictive qualities, and costs, of small screens on children and adults. But is this warning more...

“I Am Optimistic About Mankind’s Future,” says Doc Dave Dockery

The emotional impact technology has had on our lives has unarguably transformed society. The current generation doesn't know a world without computers; yet for Doc Dave...

Our Intelligence Dilemma

Following the 9/11 terrorist attack, the federal government immediately reformed its existing security programs by creating new bureaucracies. The previously unknown Patriot Act immediately...

Futurist Gray Scott: Seven Emerging Technologies That Will Change the World Forever

Over five million jobs will be lost by 2020 as a result of developments in genetics, artificial intelligence, robotics and other technological change, according...

Potential Attacks on America’s Infrastructure, Colonel Waurishuk

There are so many basics of life that we take for granted in America, our water; our electrical grid; our phones; our ability to...

Dark Web Reveals Evil Side of Mankind, Bob Francis

If you thought you knew all there was to know about the internet - think again! There is a sister universe on the web...

Changing the way we teach our kids, Will Rhame

Our kids are spending the bulk of their time on technology - some reports have kids spending as much as 12 hours a day on their...

The ‘Cyber-Fairy’ Revisited & ‘Healthy Seeds’ for your new year

While you were sleeping, the Washington cyber-fairy got her way again by convincing Congress to slide language in the omnibus budget bill that arguably violates...