fbpx
One of SEO’s hottest topics recently has been the need to migrate from HTTP to HTTPS, especially for those websites which collect personal data or passwords. Websites serving content over the secure HTTPS protocol have been given a ranking boost since 2014. Google Chrome (which...
Have you ever been attacked by trolls on social media? I have. In December a mocking tweet from white supremacist David Duke led his supporters to turn my Twitter account into an unholy sewer of Nazi ravings and disturbing personal abuse. It went on for days. We’re losing the Internet war with the...
The invention of the home computer has changed our world. Good or bad, it is dominating our lives. Many of us are addicted. We turn our computer on first thing in the morning. Our screens glow all day and into the night. Change is constant. New programs, new ways to search for information, watch mo...
We know that our smartphones are capable of doing just about anything which our desktops can do these days. But all too often, we don’t protect our smartphones nearly as well as we protect our computers. Hackers are just as capable of breaking into your smartphone and they can do all sorts of dama...
If you're job hunting potential employers will Google you, and inappropriate dirt on social media will hurt your chances of getting the gig. Jimmy Rhoades has three tips for finding what's out there and how to clean up the mess. 1.  Google Yourself 92 percent of Google ...
Google Chrome users need to be on the lookout for websites trying to trick them into downloading a font update package for their browser, as most chances are that the file is laced with malware. This infection technique was discovered by Proofpoint researchers, who say that only Chrome users on Wind...
A new phishing technique is fooling internet users into giving hackers access to their Gmail accounts. According to WordPress security plugin creator Wordfence, the way that the attack works is that hackers send emails to the contacts of compromised accounts containing a seemingly innocuou...
It's now easier than ever to use Cortana on your Android phone. A new feature currently in beta puts Cortana right on your lock screen for quick access, MSPoweruser reports.  The feature is similar to Cortana's behavior on Windows 10, where it can answer questions and perform other ta...
The website FamilyTreeNow presents itself as an alternative to genealogy websites such as Ancestry and FamilySearch. It claims to have “one of the largest collections of genealogy records anywhere.” Some old-timey photos adorning the site give the impression that it can help you discov...
It's easy to think you can spot a scam email, with all the talk about spelling mistakes, "too good to be true" offers, and strange web addresses. But scammers have come a very long way. "It's rare to see poor spelling and grammar now, because these scammers are using original logos and content and o...
Google’s Director of Strategy and Operations for Asia Pacific, Spaniard Bárbara Navarro is a high achiever and as demanding of herself as she is of others – overly so, she would say. She’s also a born leader and passionate about tackling new challenges. Born in Madrid 42 years ago to a senior...
HONGKONG: Outsiders are often told that doing business in China is unique. Winston Ma brings a fresh and eye-opening perspective to that platitude in "China's Mobile Economy". But his timely guide to the fascinating forces powering the country's tech sector plays down the difficulties face...
Microsoft's Windows 10 has been criticized a lot in three key areas during its 18 month existence. The first was the year long aggressive free upgrade campaign to get users moving from Windows 7/8.1 to Windows 10.  In fact, Chris Capossela Microsoft's Executive VP and Chief Marketing Officer, r...
It’s one thing that most people struggle with when it comes to the web, and that’s how to protect yourself from the intrusion of prying government eyes. No one likes being spied on, and the fact that this happens on a daily basis has put many people off in terms of surfing the web or being conne...
Update: Evernote heard the outcry over privacy concerns and is revisiting its policy. "Evernote employees do not and will not read your notes without your express permission," the company said in an apology post on Thursday. In case you needed another reminder that there's no such thi...
By the time the Democratic National Committee had accused Russia of hacking into its emails and passing them to Wikileaks, Arkady Bukh's cybersecurity venture was a little over a year old. Cybersec, set up in 2015, is a controversial business that uses the services of Russian and Russian-speaking ha...
As more personal information is collected up by ever-more-powerful computers, giant sets of data – big data – have become available for not only legitimate uses but also abuses. Big data has an enormous potential to revolutionize our lives with its predictive power. Imagine a future in which you...
Although cyber-attacks have traditionally implicated more liability-leaning coverages, several attacks in recent years should give property insurers cause for concern going into the future. Hackers have proven they can seize control over governmental and industrial computer systems and manipulate th...
Almost every car developed by Volkswagen AG since 1995 carries a known vulnerability that is susceptible to cyberattacks, according to a paper authored by researchers from the University of Birmingham and German engineering firm Kasper & Oswald. The vulnerability, according to the report, allows for...
Berami Mumararungu, 8, gets Rwf100 as pocket money thrice a week from his mother -for the last six months this young man invests the money into gathering knowledge that he believes will help him realize his to become Rwanda’s next generation of crime investigators. At SAY Cyber café located in Ka...
The Federal Trade Commission has filed suit against a manufacturer of home router and webcam equipment, charging it made misleading security claims about its products, which were vulnerable to hackers and risky for consumers’ privacy. According to a partially redacted complaint filed in federa...
  • Saturday, 07 January 2017 11:01
  • By:
Just a few years ago, you could get by online with four simple rules. Firstly, don’t use your dog’s name for all your account passwords. Similarly, don’t give your Wi-Fi password to your weird neighbour just because their internet isn’t setup yet. Don’t visit (too many) dodgy website...
Middle-aged people who consider themselves tech-savvy are a prime target for internet fraudsters, according to research by the insurer Aviva. More than a million over-45s have fallen victim to an online scam, even though two thirds call themselves “tech adopters” who embrace new devices. Aviva...
  • Wednesday, 04 January 2017 08:42
  • By:
How did we ever make it through life before the advent of smartphones? There are so many important things we do with these handy little gadgets it's hard to imagine being without one. One great thing smartphones have done is expand the way we communicate with others. Apps like FaceTime and Skype all...
WHETHER IT WAS a billion compromised Yahoo accounts or state-sponsored Russian hackers muscling in on the US election, this past year saw hacks of unprecedented scale and temerity. And if history is any guide, next year should yield more of the same. It’s hard to know for certain what lies ah...

airs logo

Association of Internet Research Specialists is the world's leading community for the Internet Research Specialist and provide a Unified Platform that delivers, Education, Training and Certification for Online Research.

Get Exclusive Research Tips in Your Inbox

Receive Great tips via email, enter your email to Subscribe.

Follow Us on Social Media