Your smartphone can help you spy around corners from afar

The researcher looks for subtle changes in light and shadow to detect unseen objects

by James Vincent

Seeing what’s happening on the other side of a corner isn’t as impossible as it sounds. Scientists have been working on the problem for years, using lasers to bounce light off unseen objects and detect what’s going beyond their line of sight.

What You Need To Know About The New Security Breach Notification Laws

It’s Monday morning and one of your employees notifies you that they lost their laptop at a Starbucks over the weekend, apologizing profusely. Aside from the cost and inconvenience of buying a new laptop, could you be on the hook for bigger costs, and should you notify all your clients? Maybe, depending on where you live and what type of data you had stored on that laptop.

Meet the New Standard for Business Email

Nearly all businesses rely on email to assist with day-to-day activities. But many businesses haven’t addressed new and seemingly unavoidable vulnerabilities.  If you are running an Exchange server on-site or if you lack certain email security capabilities, your email could be at risk.

Viruses Unleashed over the Holiday in Target of End of the World (EOW)

It’s me Femi Dada from Smarthost Design Technologies. Sorry for interrupting your holiday weekend, but you will for sure find this email worthy.

In light of the end of the world (EOW) there are some viruses, malware and Trojans going on out there, I just want you to know of this and learn from my mistake.

What is “UPS” and why is it one of the most important preventive measures you can take to keep your computer, network and servers secure during severe weather storm.

 

My Fellow Business Owners and Managers,

In the wake of the recent severe weather storm, if you are like most people we began thinking about what we could have done differently to prevent and minimize damages. In this short article I will like to share with you one of the most significant preventive measure you could have done if not already done to prevent your business critical infrastructure (computers, servers, network switches, phone systems, backup devices) from and hard crash, disaster and loss of data.